Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Crypto-Agility Automation: Prepare Now for Google’s 90-Day TLS Validity Proposal Muralidharan Palanisamy, Chief Solutions Officer, AppViewX Google recently announced a proposal to reduce the maximum validity period for public TLS certificates from 398 days to 90 days. This is a massive cha... 3 weeks ago | 32 mins When CDNs Fail: Staying Online with an Origin Shield Thijs Feryn, Technical Evangelist, Varnish Software If your CDN fails, your website drops offline, taking your audience and revenue with it. In this webinar we’ll show how an origin shield can save yo... 8 months ago | 47 mins dataBelt® – A complete managed service for Security Certificates Matt Smith How many of you have experienced a service outage due to an expired security certificate? It’s probably more suitable to ask who hasn’t been impacted ... 3 months ago | 15 mins Why retail observability is a key ingredient for digital transformation? Digitate’s Vikas Kalra, Global Product Manager and VS Joshi, Global Head of Product Marketing Traditional infrastructure monitoring that simply monitors databases, servers, network, and other infrastructure components is just not enough! Reta... 4 months ago | 35 mins Prevent Cyberattacks: Third-Party Risk Management Tony Howlett, SecureLink's Previous CISO Cyber attacks from nation-state actors and their proxies are on the rise. Many of these attackers seek a broader scale to do more damage than simply d... 9 months ago | 59 mins OpsRamp Fall Release Darren Cunningham, VP Marketing, Michael Fisher, Product Manager, & Curt Thorin, Solution Strategist, OpsRamp More control. More flexibility. Less chaos. The OpsRamp Fall Release includes enhancements to OpsQ, the OpsRamp artificial intelligence inference eng... 4 years ago | 37 mins DDoS Attacks: The Stakes Have Changed, Have You? Sean Pike – Program Vice President, Security Products, IDC & Tom Bienkowski – Director DDoS Product Marketing, Arbor Networks Despite years of headlines, many businesses today are under-invested and ill-prepared to handle modern DDoS attacks. Many wrongly believe they are not... 7 years ago | 58 mins From Reactive to Proactive: Building a Synthetic Monitoring Practice Billy Hoffman - Sr. Principal Engineer, Splunk Many organizations already use synthetic performance monitoring to measure service uptime and alert on availability issues. However Synthetic monitori... 6 months ago | 59 mins Harness Mature Cyber Catastrophe Models to Make Critical Business Decisions Jamie Pocock (Guy Carpenter) Matthew Hogg (Liberty Specialty Markets) Matt Harrison (RMS) Cyber cat modelling has come of age: advances in machine learning, data aggregation and novel usage of science are enabling P&C insurers to make cruci... 2 years ago | 67 mins Don't Lose Control Over Your .com Jonathan Lewis, VP Product Marketing Even the most security focused businesses are susceptible to vulnerabilities such as DNS cache poisoning, DNS outages, or DDoS attacks. These can lead... 5 years ago | 30 mins