Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date A New Way with CBA: Bringing Phishing-resistant Authentication to Mobile Scott Truger, Partner Integrations Manager @ Axiad and Shakeel Aziz, Solutions Engineer @ Yubico Certificate-based authentication (CBA) has been a staple of governments and high security environments for decades, and remains a favorite amongst sec... 3 days ago | 38 mins How To Achieve Zero Trust Patrick Sullivan, Akamai | Dan Petrillo, Akamai | Aleksandar Radosavljević, STADA Group Zero Trust is no longer just a buzz phrase. It has become a business staple. Zero Trust represents a move away from “trust but verify” to “never trust... 1 month ago | 43 mins Exploring China’s Spring Festival: Traditions Reemerge Post-COVID Xiabing Su In this week's video, KraneShares' Xiabing Su showcases traditional customs and celebrations of the Spring Festival as it makes its first full return ... 2 months ago | 3 mins Using Software Off-Label To Make Content Magic Happen Guest: Rahel Anne Bailie > Hosts: Patrick Bosek and Scott Abel Much like we use medication “off-label” – the way that botox was originally used to treat strabismus (crossed eyes) but is now a beauty-industry stapl... 4 months ago | 62 mins Demystifying Kubernetes Network Security Richard Meeus, Director of Security Technology and Strategy, Yuval Goldberg, Senior Manager, Product Management, Akamai As Kubernetes (K8s) catches on and becomes a staple in almost any datacenter, it is more important than ever to understand the network security bounda... 7 months ago | 46 mins Using & Optimising Visual Media in Times of Crisis Nick Denton, Network Operations, Sports Direct, Leszek Kotłowski, IT System Analyst Team Leader, Staples Solutions In a time when in-person and in-store engagements with brands are impossible or limited, companies increasingly share information through visual means... 2 years ago | 45 mins Role of Artificial Intelligence in Information Protection Itir Clarke & Chris Muffat Artificial Intelligence (AI) and Machine Learning (ML) are beginning to shape information protection and cloud security. With massive growth in data ... 8 months ago | 61 mins HSM-as-a-Service- Innovate before it's too late John Wyss ,VP Product ,Fortanix ,Julian Weinberger ,Sales Engineer, Fortanix Hardware Security Modules (HSMs) are like bank lockers that safeguard your valuables. They’re enterprise staple for storing sensitive information and ... 1 year ago | 63 mins Remote Support Tools: Then vs Now Chris Handley, Senior Product Manager at GoTo, and Marie Ruzzo, Product Marketing Director (Remote Support Group) at GoTo Remote support tools have long been a staple of support operations and an indispensable tool to diagnose, troubleshoot, and fix a customer’s technical... 7 months ago | 41 mins 2022 Cyberthreat Defense Report Insights Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security | Steve Piper, Founder & CEO, CyberEdge Group As the saying goes, "knowledge is power." That statement holds an incredible amount of truth regarding the cybersecurity field. Security professionals... 11 months ago | 60 mins Load more