Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Data Security & Governance for the Way You Work Today

The old cybersecurity stack is being pushed to the brink and no longer meets the needs of modern distributed workforces. It’s time for data security to adapt to the way we work today by putting data at the center of the security strategy. Learn how Egnyte is reimagining data governance and cloud security by delivering centralized visibility and control over your most sensitive content, wherever it’s accessed.

Hardened Access - Dual Authorization for Roles & Per-session MFA with Yubikeys

This webinar is a deep dive into how companies can harden access to Teleport with two new features in Teleport 6.1 These include creating dual & multi Authorization rules, requiring multiple team members to approve role escalation. This is an important FedRAMP control ( AC-3 ) and increasing the visibility and audibility for access. We’ll show how you can enforce per session MFA with the aid of hardware tokens; reducing the scope and risk related to certificate exfiltration.

The Right Steps to SASE: Understand Where You're Going

When undertaking a new project, the need to deliver quantifiable results today (or at least very quickly!) is a significant challenge facing a CIO, CISO, or anyone with high-level responsibility for enterprise networking and security. Unlike typical IT projects where long development cycles may be tolerated, security must demonstrate value right away and deliver quick wins. Vulnerability is scary.

Live From RSAC: Is Digital Transformation Making AppSec Headless?

Chris Wysopal, Veracode Co-Founder and CTO, recently sat down with Tom Field, ISMG Senior Vice President of Editorial, for an executive interview at the RSA Conference 2021 to discuss if digital transformations are making application security (AppSec) “headless.”