Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [Replay] Radware Threat Researchers Live - ep.16 - Game Hacking Special w/ Cyrex Pascal Geenens & Daniel Smith, Radware This Episode is an Online Game Hacking Special with Mathieu Huysman, co-founder & COO of Cyrex, an expert penetration tester and ethical hacker. Mathi... 4 months ago | 80 mins Stop the Apache Log4J Vulnerability and Prevent Future Attacks With Zero Trust Deepen Desai, CISO & VP Security Research Zscaler & Rick Miles, Senior Director of Product Management at Zscaler A devastating vulnerability was recently discovered in the popular Apache Log4j Java logging library that allows attackers to execute code remotely. I... 1 day ago | 58 mins Simplify Your Modern Workplace Transformation with Innovative Zero Trust Lisa Lorenzin, Field CTO - AMS, Zscaler Transitioning to a zero-trust architecture improves the risk framework and reduces the attack surface of an entire environment, while at the same time... May 19, 2022 5:00pm Cybersecurity Resiliency Framework Built on a Foundation of Threat Intelligence Matt Aldridge, Michael Suby Cyber resilience can be an intimidating topic for any business, but the risk of a cyber attack is higher than ever. It is critical for companies to ta... 1 day ago | 59 mins Securing O365 & Enterprise Apps on Mobile Devices: Recommendations from Gartner Chris Silva, VP Analyst with Gartner; and Jon Paterson, CTO with Zimperium Microsoft Office 365 and other productivity apps are now commonplace on both corporate and personal (BYO) mobile devices. According to Zimperium’s 202... 1 day ago | 47 mins Don't Become the Next Cautionary Tale: Top Breach Prevention Strategies. Panel of experts Businesses are now spending $170.4 billion on information security annually, according to research from Gartner. Despite this huge investment, IBM's a... May 19, 2022 3:00pm Modernizing Supply Chain Cybersecurity Via Multi-Signal Threat Investigation Ryan Westman, Mgr,Threat Intell,eSentire;Paul Tobia, Sr. Security Product Mgr, Sumo Logic; Brandon Dunlap, Moderator In the last year alone, the number of supply chain attacks has grown exponentially as they offer threat actors stealthy, scalable, and privileged acce... 1 week ago | 59 mins Why Quadrant Knowledge Solutions Named Zimperium The Leader in In-App Protection Divya Baranawal, Research Director, Quadrant Knowledge Solutions; Krishna Vishnubhotla, VP of Product Management, Zimperium Quadrant Knowledge Solutions, a global advisory and consulting firm, recently published its “SPARK Matrix: In-App Protection, 2022” report and named Z... May 26, 2022 3:00pm Lessons Learned From Log4j: Mitigating Zero-Day Attacks Richard Meeus, Director of Security Technology and Strategy, EMEA, Akamai, Eran Haim, Senior Solutions Engineer, Guardicore The Log4j vulnerability caused widespread panic with organizations rushing to assess the impact caused and deploy mitigation strategies. These types o... May 31, 2022 1:00pm Data Protection for Organizations Christopher Meyer, Product Manager at Utimaco and Lena Backes, Product Marketing Manager at Utimaco Data protection is a challenge that affects all companies, regardless of their industry. You must keep up with regulations while generating a massive ... 1 week ago | 61 mins Load more