Insights

Cloud Security

As more and more organizations use cloud services cyber security and compliance has taken center stage. The benefits of using the cloud for business-critical applications can be undermined if this leads to cyber-attacks, data breaches and compliance failure.

Guide
Guide
Stairway to Cloud Security
Read the complete step-by-step guide to help you make the right decisions to minimize risk and achieve high cloud security.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
The DON’Ts of IT in the Times of Crisis
Truly we are living in interesting times (incidentally, this expression, commonly known as “the Chinese curse”, has nothing to do with China ). Just a couple of weeks ago the...
Learn more
Whitepaper
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
Learn more
Event Recording
Event Recording
Trends in Enterprise Authentication
Learn more
Rethinking Cloud Access Management
Event Recording
Rethinking Cloud Access Management
We must secure our organization’s processes regardless of what tech they run on. Originally, security leaders had leverage. We controlled the horizontal. We controlled the vertical. And if...
Cloud Signatures for the New eIDAS Wallet Ecosystem
Event Recording
Cloud Signatures for the New eIDAS Wallet Ecosystem
To enhance interoperability between digital identity schemes and digital trust services across borders, the eIDAS regulation provides a legal framework for electronic signatures in the EU,...
Market Overview: Secure Access Service Edge (SASE)
Event Recording
Market Overview: Secure Access Service Edge (SASE)
The term secure access service edge (SASE) has become popular in recent months and has been adopted by numerous vendors. SASE stands for a concept that integrates a range of cloud-native security...
Big Bang to the Cloud - Lessons Learned from a Successful Large-scale Production System Migration
Event Recording
Big Bang to the Cloud - Lessons Learned from a Successful Large-scale Production System Migration
Managing access is a critical capability for the IT infrastructure of any enterprise, especially when dealing with over 6,800 integrated applications used by millions of authentication requests....
IAM Across Hybrid On-Premises and Cloud Resources
Event Recording
IAM Across Hybrid On-Premises and Cloud Resources
We will be discussing an identity fabric model that allow for growth, ease of integration, and a way to future proof your organization.
Cloud-Powered Technologies and Strategies for Secured DevOps Environments
Event Recording
Cloud-Powered Technologies and Strategies for Secured DevOps Environments
As organizations shift to agile development methodologies and the use of cloud-based platforms, they have the opportunity to leverage the cloud to improve their security practices. By adopting a...
Hack a Cloud and Kubernetes
Event Recording
Hack a Cloud and Kubernetes
People are under the impression that when you spin up the latest and greatest AKS, EKS, OpenShift or GKE instance, that you're secure. However with K8S, now more than ever the workload underneath...
Managing your Code-to-Cloud Security Risks in a Multi-Cloud Environment
Event Recording
Managing your Code-to-Cloud Security Risks in a Multi-Cloud Environment
The shift to multi-cloud introduces a wide range of cloud security risks that remain unaddressed due to the siloed approach and limited focus of existing cloud security tools. Most cloud security...
Why Active Directory is the Prime Cyber attack Target - and what to do about it!
Event Recording
Why Active Directory is the Prime Cyber attack Target - and what to do about it!
For more than two decades, Microsoft Active Directory (AD) has been the de facto method organizations use to authenticate and authorize users for access to computers, devices, and applications...
European Identity & Cloud Awards Ceremony
Event Recording
European Identity & Cloud Awards Ceremony
Opening Session
Event Recording
Opening Session
Identity Inclusion – Why it Matters
Event Recording
Identity Inclusion – Why it Matters
The cornerstone of the digital world is trust and key to that experience is a secure and verifiable digital identity. More than one billion people worldwide lack a basic verifiable identity....
Previous
1 2 3 4 5 6 7 Next