Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyber Notes Cast - Security Training Best Practices for Privileged Users senhasegura It is essential to train privileged users to avoid cyber threats, as they are the primary victims of hackers. Read our article and learn how to do it.... 7 days ago | 4 mins Beyond the VPN: Why IT is Switching to ZeroTrust to Support Hybrid Work Linda Park, Sr. Product Marketing Manager, Zscaler, Brad Lisoweski, Principal Technical Product Specialist, Zscaler Interest in zero trust security initiatives is at an all-time high, with 72% of companies prioritizing zero trust adoption. IT leaders are using the m... 1 month ago | 56 mins Cyber Notes Cast - Zero Trust-Based Security Approaches senhasegura In a world of complex cybersecurity threats and mobile workforces armed with multiple apps and devices, security in Zero Trust aims to provide compreh... 2 months ago | 6 mins How to Easily Protect and Manage Data Everywhere From One Place Thomas Bill, Engineer at Rubrik With your data in one place, you can leverage Zero Trust Data Protection to detect and recover from ransomware, reduce sensitive data exposure, and pr... July 19, 2023 9:00am How enterprises become exposed to hidden risks from subsidiaries and web apps Emma Zaballos, Product Marketing Manager, CyCognito and Jonathan Keÿzer, Sales Engineer, CyCognito As large enterprises expand their global footprint through mergers and acquisitions and create subsidiary brands and products, their external attack s... 2 months ago | 50 mins Cyber Notes Cast - Applying Zero Trust to PAM senhasegura The implementation of the Zero Trust-based security model has gained space in recent times, promoting the default approach of never trusting, and alwa... 2 months ago | 13 mins Beyond the VPN: Why IT is Switching to ZeroTrust to Support Hybrid Work "Linda Park, Sr. Product Marketing Manager, Zscaler, Brad Lisoweski, Principal Technical Product Specialist, Zscaler" "Interest in zero trust security initiatives is at an all-time high, with 72% of companies prioritizing zero trust adoption. IT leaders are using the ... 7 months ago | 56 mins From Ransomware to ZeroTrust: CISO Insights in 2022 Chris Borales, Sr. Product Marketing Manager - Gigamon + Mark Bouchard, CISSP, CEO - AimPoint Group Originally aired on an ActualTech Media webcast. The role of the Chief Information Security Officer (CISO) has grown to become integral to every aspe... 10 months ago | 59 mins How to collaborate and deploy secure code without trust Jianing Sandra Guo, Product Manager - Google Cloud & Rene Kolga, Product Manager - Google Cloud With external code and data collaboration becoming the norm for organizations, we have moved from a world of “Trust but Verify” to “Verify, and only t... 6 months ago | 18 mins Zero-Trust for Multi-Cloud Data Protection Juan Asenjo, Director of Products & Partner Mktg, Entrust As organizations migrate to multi-cloud environments to manage workloads in a more flexible and cost-effective manner, the number of credentials used ... 4 months ago | 27 mins Load more