Results for security

Growing CyberSecurity Skills Gap Worries Security Professionals; Highlights Challenges for Staffing

A recent survey on security staff confirms what we all know – IT is growing even more worried that these professionals are so hard to find, hire and keep.  But the survey, commissioned by Tripwire, also found the shortage is prompting companies to their methods for how to protect against cyberattacks. 

Full Story >

Four Ways To Adapt Your Security for Digital Transformation – And Keep Pace with the Speed of Business

News of the Verizon data breach is just the latest reminder of how tough it is for CIOs and CISOs to balance ‘security’ vs ‘innovation’ in the age of digital transformation and hybrid (borderless) architectures.  One Identity’s Todd Peterson shares 4 proven strategies for how security professionals can be responsive to business initiatives -- without compromising on security needs. 

Full Story >

Akamai Delivers Cloud-Based Security, Powered by Smart Algorithms, To Thwart DNS, Malware Attacks

Akamai Technologies, well known for high-performance content delivery over the Internet, is leveraging that knowledge to deliver a high-impact security service from the cloud.  IDN talks with Akamai’s Frank Childs to learn how its Enterprise Threat Protector thwarts DNS, malware and bot attacks.

Full Story >

BlackBerry Optimizes Mobile Security Platform for IoT

BlackBerry is shipping updated security and productivity for its BlackBerry Enterprise Mobility Suite (BEMS). The upgrade comes to meet an expected flood of IoT devices – with estimates hitting 20 billion in three years.

Full Story >

With Ansible Automation, Red Hat Insights Can Resolve Critical Infrastructure Outages Security Risks

Red Hat Insights cloud-based service is integrating with Ansible ‘playbooks’ to deliver abilities to automatically remediate outages or other issues that can impact infrastructure security, performance, and stability.

Full Story >

HPE Update Lets Enterprises, Service Providers More Easily Secure Credit Card Transactions End-to-End

HPE is updating its secure payments technologies to help ecommerce service providers and merchants more easily deliver end-to-end security for credit card transactions and sensitive personal data.  IDN speaks with HPE’s Trish Reilly about the on-going issue of keeping transaction data safe.

Full Story >

RedLock Cloud 360 Aims To Provide Visibility into Security, Risk Across Multiple Public Cloud Environments

More companies are adopting public clouds as part of their digital transformation strategy. RedLock Cloud 360 aims to provide IT with better visibility and control of cloud infrastructure they don’t own.

Full Story >

Distil Networks Lets IT Calculate Economic Risk from ‘Bad Bot’ Attacks; Teams with Verizon on Bad Bot Protection

Distil Networks has published an innovative  Bad Bot Risk Calculator, designed to help organizations understand and quantify the economic risk posed by bad bots.  The tool comes as OWASP, Verizon and other major security voices warn bad bot attacks are a growing risk.

Full Story >

Webscale’s Cloud Web Application Firewall Takes SaaS Approach to Web App Security

For web site and application operators, attacks at the application layer can be varied – and catastrophic. Webscale is adding a SaaS-based firewall to its cloud-based web application delivery platform.

Full Story >

‘Full Life Cycle’ API Management Can Drive Competitive Advantage

As APIs become a popular part of digital transformation, adopters are finding API management across the ‘full lifecycle,’ adds to business impact and ROI.  IDN looks at the study from CA Technologies and Coleman Parkes Research.

Full Story >

Integration is The Next Step to ROI on Big Data Analytics

Organizations looking for more value from big data investments are finding integration developers  – rather than new big data specialists – may hold the key. Progress’   Sumit Sarkar reveals why integration skills can quickly spread big data ROI to more business apps and users.

Full Story >

Centrify Analytics Service Uses Machine Learning and User Behavior To Stop Breaches in Real Time

A Forrester Research study, commissioned by security firm Centrify, estimates 1 billion identities were compromised in 2016.  The firm is also launching Centrify Analytics Service to shore up access protection with real-time analytics and machine learning.

Full Story >

<< Start < Previous 1 2 3 4 5 6 7 8 9 10 Next > End >>
Showing 1 - 12 of 246

Videos

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture

Cloud Considerations



  • Name
    Title

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Integrate Data Security with Your Big Data Platform



  • Praveen Jain - HPE Big Data Platform
  • Reiner Kappenberger - HPE Security

Symantec Resource Center - Enterprise Security



Agenda: Enterprise Security Summit



Deconstructing API Security



  • Ian Goldsmith - VP, Product Management

Moving Data and Applications to the Cloud Securely - End-to-End Trusted Security



  • Trish Reilly - Global Product Marketing Manager - HPE Security - Data Security
  • Marcelo Delima - Global Product Marketing Manager - HPE SecureMail

Identity-Centric Security for the Modern Cloud Era



  • Akshay Bhargava - VP, Security Product Marketing

Enterprise Security Summit Agenda



  • Name - Title

Protect Your Most Valuable Assets – Your Data!



  • Reiner Kappenberger - Global Product Management, HPE Security - Data Security

A New Partnership to Mitigate Bots – Distil Networks and Verizon



  • Edward Roberts - Dir of Product Marketing
  • Tin Zaw - Dir of Security Solutions, Verizon

The New Enterprise Security Model



  • Eric Karlinsky - Group Technical Marketing Manager

REST API Security



  • Tom Donahoe - Director of Secure Software Engineering

Symantec Enterprise Security Resource Center



  • Name - Title

Mobile Data-Centric Security from HPE Security



  • Smrithi Konanur - Global Product Manager - HPE Security – Data Security

Enterprise Security Summit, Agenda



HPE Security and CyberEdge Disclose - 2017 Cyberthreat Defense Report Findings



  • Mark Bouchard - COO - CyberEdge Group
  • Sheryl Wharff - Global Product & Channel Marketing - HPE

The New Enterprise Security Model



  • Eric Karlinsky - Group Technical Marketing Manager

Managing the Cloud Security Unknowns - Regulating the Risk and Exposure of Cloud Services



  • Andy Smith - Sr Director Product Management

Securing End Users Across The Digital Enterprise



  • Patrick Sullivan - Global Director of Security Strategy

Migration to Hybrid IT: Cloud Data Protection - End-to-End Trusted Security