Results for Security

Docker Content Trust: How Container Signing Protects Users from Downloading Compromised Code

As Docker adoption explodes, malicious actors are increasingly focusing on container attacks.  IDN Contributing Editor David Bisson reviews some of the best ways to protect your code – and your organization.

Full Story >

Expanse for AWS Lets Users Secure Cloud-Facing Assets with Attack Surface Management

Expanse has optimized its attack surface management solution for Amazon Web Services. Expanse for AWS deploys automatically to provide full visibility into their public-facing cloud assets to limit unsanctioned accounts.

Full Story >

Trend Micro’s Cloud One Now Protects Apps with Runtime Security, Preemptive Protection

Trend Micro is expanding its cloud-native security offerings with pre-emptive protection for a wide range of modern apps – cloud, hybrid, serverless and APIs.  IDN explores Cloud One – Application Security with vice president Wendy Moore.

Full Story >

Druva Delivers SaaS-Based Data Protection for Kubernetes

Druva is introducing a cloud-based SaaS solution to offer users simplified, enterprise-grade backup and disaster recovery support for Kubernetes. It also protects on-prem data centers and cloud workloads via a unified interface.

Full Story >

FireMon Marries Security, Agility in New Agile Network Security Policy Management Platform

FireMon is bringing agility and speed to a range of security capabilities that companies say they need to adopt cloud more quickly.  IDN looks at FireMon’s marriage of “agile” with network security policy management platform technology.

Full Story >

Workato Aurora Combines AI, Low-Code To Rapidly Integrate, Automate Workflows

Workato has launched an update to its enterprise automation platform. The company's Aurora Release combines AI, low-code/no-code integration and more to prome faster app releases and deeper collaboration.

Full Story >

Study Suggests Data Privacy Efforts Can Be Rewarded with Customer Loyalty

A recent study suggests that companies willing to invest in data privacy may be rewarded by customer loyalty. IDN summarizes findings from Privitar’s 2020 Consumer Trust and Data Privacy Report.

Full Story >

Security at the Speed of DevOps: How Engineering Learned To Love Security in the Age of Covid-19

Covid has exacerbated the tension between software engineers and security teams, says Code CTO Rob Junker.  In this post, he walks us through how to create a new DevSecOps culture that integrates security into app lifecycles at eye-popping speed.

Full Story >

Cequence's API Sentinel Looks to Provide Continuous API Security, Visibility and Monitoring

Cequence is adding a new level of API security for continuous runtime visibility and protection. IDN looks at Cequence API Sentinel.

Full Story >

IDC Study Finds Cloud Data Breaches Impact 80% of CISOs

Cloud data breaches are disrupting companies at an alarming rate, according to a recent study for chief information security officers (CISOs). IDN looks at recent findings from an IDC study.

Full Story >

Okta FastPass Brings Passwordless Logins to Reality

This year, the vision for passwordless authentication gets real as Okta rolls out FastPass context-driven login technology. IDN explores how it works with Okta’s Joe Diamond.

Full Story >

Survey: Even as More Firms Migrate Security Tools to the Cloud, Concerns Remain

Even as more companies migrate security tools to the cloud, a survey from SIEM provider Exabeam reveals concerns remain. Respondents admitted to concerns over data privacy, unauthorized access, server outages, and integration as critical concerns.

Full Story >

Showing 25 - 36 of 78

Videos

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Cloud Considerations



  • Name
    Title

Low-Code Architecture Essentials for Modern Employee & Consumer Apps



  • Carlos Carvajal CMO
  • Matt Terry SVP Products

No Passwords, No Problem: Using WebAuthn To Stop Account Takeover for Browsers



  • Swaroop Sham - Sr. Product Marketing Manager Customer Identity

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture