In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
With most security discourse is concerned with defending your business-critical data and other digital infrastructure, it can be easy to lose sight of where your organization is most vulnerable; It’s physical location. Watch the webcast to learn why security needs to be calculated into the foundation of building design.
Yes, IoT devices present innovative opportunities. Yet, given that many of those devices lack built-in security controls, IoT devices also present security risks. For a deep dive on the state of IoT security, check out this webcast featuring three leaders from Portnox.
If your business leverages digital technology, then securing human access is not enough - attackers will find the weak point. Don’t let it happen to you! In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access. Tune in now to learn more.
In recent years, the software supply chain has experienced the worst and most consequential cyber attacks out of any other sector. In fact, 98% of organizations have felt the impact of a breach in their supply chain. So, what steps can you take to better protect your software supply chain? Tune into this webinar to learn more.
If you have APIs unaccounted for out in the wild, they’re just a security breach waiting to happen. But how can your organization balance tight security with fast development times? This webinar dives into what you need to know to secure your APIs, including how to shift left effectively and how to solve the runtime security problem. Tune in here.
Cloud environments, while having opened the door to many opportunities, have also introduced added complexity into the security equation. In this webcast, ESG Senior Analyst, Melinda Marks, meets with AWS’s Anthony Smith and Palo Alto’s Jason Williams, to explore the importance of managing security posture in the cloud. Watch now to learn more.
As cyber threats continue to get more innovative and attack surfaces continue to expand, many organizations are looking for new ways that they can ensure their information stays safe. So, what can DevOps, security, and IT leaders do to keep up? Tune into this webinar to discover more.
The importance of a centralized identity security program is vital for both human and machine identities. While other vaults and open-source tools have their merits, these on-premises tools often require costly skills and resources to host and maintain. Join this webinar to learn the benefits of centralizing your secrets management.