Results for security

CircleCI CI/CD Solution Boosts Security, Insights and Ease of Installation

CircleCI Server 3.2 is increasing privacy, efficiency, and collaboration across teams with end-to-end control over their CircleCI installation. The update comes as organization increasingly prioritize cybersecurity and governance.

Full Story >

Elastic Acquires Build.Security To Enhance Cloud-Native, Kubernetes Security

Elastic Security has its eye on cloud-native security enforcement, with the acquisition of Isreali startup build.security.  Once integrated, the offering will all the ability to enforce security actions on hosts, virtual machines, and containers orchestrated by Kubernetes.

Full Story >

Survey: Mobile Users Want Vendors To Focus on In-App, On-Device Security

A recent survey finds mobile consumers want stronger and reliable security for their apps, data and device – even if at the expense of a cool, new feature.  IDN talks with Tom Tovar, CEO of Appdome, the company behind the research.

Full Story >

SailPoint Set To Offer a No-Code Way To Automate Security Tasks, Customize Workflow

As companies struggle to find identity talent, SailPoint is bringing a no-code approach to identity security. SailPoint Workflows lets users integrate and automate such processes in a few clicks.

Full Story >

Ivanti Study Shows Enterprise IT Teams, Workers May Be Losing Cyber War on Phishing

Since the pandemic, companies are undergoing a surge in cybersecurity attacks – particularly in phishing. A recent survey from Ivanti details the issue, and makes some recommendations.

Full Story >

How Security as Code Can Accelerate DevSecOps

In 2021, major hacks are revealing new vulnerabilities to modern applications and the infrastructure they run on. GitLab’s Cindy Blake shows IDN why automation and security-as-code can provide broad protections and deliver a more reliable DevSecOps.

Full Story >

Tips for Taking Control of Microsoft Teams Sprawl

Microsoft Teams has become a go-to solution for remote work, with 145 million daily users.  But with widespread use,  “Teams sprawl,” can hinder productivity.  Voleer America’s GM Willie Cash shares with IDN the symptoms and fixes.

Full Story >

FireEye Sells Product Business; Focus Shifts to Mandiant Cyber Security, Intelligence Cloud Services

FireEye is doubling down on its vision for cloud-based cyber security and intelligence and its expanding Mandiant Advantage technologies. The updates come as FireEye announced an agreement to sell its FireEye Products business to a consortium led by Symphony Technology Group.

Full Story >

Accurics Enhances Developer-First View of Cloud Security with Channel Program

Accurics is launching a partner program to develop a rich ecosystem around protecting and securing Infrastructure as Code initiatives. IDN reviews the program and looks at early participants.

Full Story >

How to Modernize Legacy and Next Gen Cloud Identity and Access Management

While the Covid-19 pandemic has sped cloud migration, some enterprises find their identity and security practices haven’t keep pace. One Identity’s Todd Peterson shares proven identity-centric ways to always keep apps, data and users safe.

Full Story >

IaC: Enabling Security in DevOps Workflows

Many DevOps projects now leverage Infrastructure as Code for efficient, accurate and repeatable outcomes. But, IaC can also present risks. Accurics’ Om Moolchandani shares the ways to use IaC for secure DevOps workflow - and how to avoid risk. 

Full Story >

Teleport 6.0 Provides Secure Access, Visibility to Remote Users of PostgreSQL, MySQL

Teleport 6.0 is solving database access and security challenges that arise from multi-cloud and work-from-home environments. IDN talks with Teleport CEO Ev Kontsevoy about the firm’s ‘balanced’ approach, which meets the needs of users and security teams.

Full Story >

<< Start < Previous 1 2 3 4 5 6 Next > End >>
Showing 1 - 12 of 68

Videos

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Cloud Considerations



  • Name
    Title

Low-Code Architecture Essentials for Modern Employee & Consumer Apps



  • Carlos Carvajal CMO
  • Matt Terry SVP Products

No Passwords, No Problem: Using WebAuthn To Stop Account Takeover for Browsers



  • Swaroop Sham - Sr. Product Marketing Manager Customer Identity

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture