Results for Security

Las Vegas Casino Cyberattacks Underscore Importance of ‘Human Firewalls” and Employee Training

They say Las Vegas never sleeps, But a massive cyberattack recently brought many of the strip’s most famed casinos to a standstill. Hornetsecurity’s Andy Syrewicze shares his tips for how to add a “human firewall” to your protection against cybercrime.

Full Story >

Report: Endor Labs Identifies 2023 Operational, Security Risks To Open Source

Endor Labs, along with 20 other technology veterans have outlined the top 10 open source software risks of 2023. The authors hope to provide a gold standard for gauging open source risks.

Full Story >

The Pre-Post-Password World Is Growing More and More Complicated for Enterprises

The world of passwordless is coming in sight, as Apple, Google and Microsoft have joined forces to support ‘fast identity online’ passkey authentication.  Onymos CEO Shiva Nathan shares the road to passwordless. 

Full Story >

SentinelOne Expands DataSet Technologies for Container, Cloud-Native Security

SentinelOne is expanding its DataSet technology to make it easier for developers to secure and troubleshoot their cloud-native, Kubernetes and DevOps projects.

Full Story >

2021 Was Worst Year Ever for Ransomware; Two-Thirds of Victims Paid Ransom

A recent report finds 2021 was a record-setting year for successful ransomware attacks. A lack of skilled security staff and poor workforce practices meant ransoms were paid at an alarming rate.

Full Story >

Orca Security's Attack Path Analysis Improves Protection for Cloud-Naïve Apps

Orca Security’s Attack Path Analysis and Business Impact Score offering lets developers and IT staff guard their cloud-native apps from vulnerabilities.  Orca’s easy-to-follow visualizations eliminate the need to chase hundreds of alarms.

Full Story >

Data Privacy and Fallacies

To improve data privacy and security, enterprise IT and business users are taking a harder look at their data collection policies.  Axway’s Brian Pagano says ensuring data security and privacy often starts by simply asking what data is necessary to collect.

Full Story >

Deep Instinct Threat Report Says Attacks More Numerous, More Evasive

Cyberattacks remain over double pre-pandemic levels, according to a new report from Deep Instinct. Perhaps even more troubling, attacks are focusing on new targets, including AI/ML protections.

Full Story >

Cloudflare Unifies Email Security and Zero Trust with Acquisition of Area 1 Security

Cloudflare is acquiring Area 1 Security and its email security solution. With it, Cloudflare is taking the next step in its vision to deliver an integrated, one-click approach to Zero Trust to securing an enterprise’s full suite of apps.

Full Story >

Insecure APIs Threaten Mobile App Security – What To Do

Today’s mobile apps increasingly rely on APIs to access data and backend services.  Appdome CEO Tom Tovar explains how such APIs can threaten mobile app security – and what developers can do about it. 

Full Story >

CircleCI CI/CD Solution Boosts Security, Insights and Ease of Installation

CircleCI Server 3.2 is increasing privacy, efficiency, and collaboration across teams with end-to-end control over their CircleCI installation. The update comes as organization increasingly prioritize cybersecurity and governance.

Full Story >

Elastic Acquires Build.Security To Enhance Cloud-Native, Kubernetes Security

Elastic Security has its eye on cloud-native security enforcement, with the acquisition of Isreali startup build.security.  Once integrated, the offering will all the ability to enforce security actions on hosts, virtual machines, and containers orchestrated by Kubernetes.

Full Story >

<< Start < Previous 1 2 3 4 5 6 7 Next > End >>
Showing 1 - 12 of 78

Videos

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Cloud Considerations



  • Name
    Title

Low-Code Architecture Essentials for Modern Employee & Consumer Apps



  • Carlos Carvajal CMO
  • Matt Terry SVP Products

No Passwords, No Problem: Using WebAuthn To Stop Account Takeover for Browsers



  • Swaroop Sham - Sr. Product Marketing Manager Customer Identity

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture