Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date A new approach for browser-based performance testing Bryan Cole To effectively verify performance under load, your performance testing strategy should include both protocol and browser-based testing. But traditiona... 7 days ago | 14 mins Integrating Secure Code Signing in the CI/CD Pipeline Ryan Sanders, Sr. Dir Product & Customer Mktg & Eric Mizell, VP of Field Engineering Keyfactor; Brandon Dunlap, Moderator Code signing is a powerful method to protect the integrity of containers, artifacts, and software across the continuous integration and continuous dep... 15 hours ago | 60 mins Making Sustainability a Successful Strategic IT Initiative Christophe Bertrand - Enterprise Strategy Group, Jeff Reichard - Veeam, Adam Lewis - Atos As environmental matters remain increasingly relevant, it's crucial that organizations adapt their business strategies to prioritize environmental, so... 3 weeks ago | 44 mins Prove Zero-Trust Compliance Throughout the Multi-Cloud Environment Kevin Kuhls and Scot Wilson, Sr Technical Solutions Architects, Forward Networks. Protecting IT systems is harder than ever. As threats continue to escalate and the transition to hybrid and multi-cloud environments accelerates, the ... 1 month ago | 54 mins Zero Trust: Verify Identity and Enforce Security in the Hybrid Workplace Jamey Heary, Chief Security Architect, Global Security Architecture, Cisco Systems Your workers need access to a myriad of cloud apps and online services, but how do you protect your data and users consistently when they are remote? ... 3 months ago | 60 mins Don’t Break the Code! Verify Coverage for Legacy Code Updates Brian McGlauflin, Sr. Software Engineer As a Java software developer, you probably prefer to write new code to create features or enhancements instead of tweaking legacy code. But legacy app... 4 months ago | 61 mins Securing Modern Apps in Google Cloud Adrian Corona, Head of Security Solutions - Google Cloud & Javier Dominguez, Head of Security Solutions - Google Cloud Organizations are prioritizing application modernization which allows them to accelerate time to market, unlock value, and improve operational efficie... 2 months ago | 29 mins A Master Class Webinar: Zero Trust, The only way to secure the modern business Mark Lynd, Ranked #1 Global Security Thought Leader by Thinker 360 Cybersecurity attacks and breaches are going up around the world and in 2022 things are getting worse. Given the huge monetary and reputational damage... 3 months ago | 40 mins Zero Trust with Zero Fuss | Securing Hybrid Workforce Using Zero Trust Approach Rohan Ramesh - Product Marketing Management Director - Entrust Identity With the post pandemic world settling into a new norm of a hybrid workforce, organizations need to ensure employees (and contractors) can access resou... 2 months ago | 42 mins Power Up Your Identity and Access Management Jonathan Blackwell (Director of Engineering at Netwrix), Julian Paul (Solution Architect at Netwrix) To protect your organization’s most valuable assets, it’s critical to secure all three attack surfaces: data, identities and infrastructure. That puts... 2 months ago | 46 mins Load more