Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Malicious Actors Exploiting Coronavirus Fears
Security researchers are discovering a number of malicious attacks designed to exploit public fears around COVID-19, more commonly just called coronavirus. The attacks to date take two major...
Learn more
Leadership Compass
Leadership Compass
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. Unlike traditional...
Learn more
Event Recording
Event Recording
Moving on from legacy MFA: Phishing-resistant MFA as a prerequisite for Passwordless
As long as passwords exist, enterprises are vulnerable to account takeover attacks –yet organizations looking to eliminate passwords may not know where to begin their passwordless journey....
Learn more
Nok Nok Labs Extends FIDO-Based Authentication
Blog
Nok Nok Labs Extends FIDO-Based Authentication
Nok Nok Labs has made FIDO certified multi-factor authentication – which seeks to eliminate dependence on password-based security - available across all digital channels by adding a...
How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”
Webinar Recording
How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a...
Security Vendor Imperva Reports a Breach
Blog
Security Vendor Imperva Reports a Breach
Imperva , a US-based cybersecurity company known for its web application security and data protection products, has disclosed a breach of their customer data. According to the announcement , a...
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
Blog
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
Security has seldom been the focus of device manufacturers who have historically taken their own approach for securing the devices in the IoT. Most devices in enterprise, consumer or industrial...
The Dark Side of the API Economy
Webinar Recording
The Dark Side of the API Economy
In a single decade, Application Programming Interfaces (APIs) have evolved from a purely technical concept into one of the foundations of modern digital business, delivering operational...
API Security in Microservices Architectures
Blog
API Security in Microservices Architectures
Microservice-based architectures allow businesses to develop and deploy their applications in a much more flexible, scalable and convenient way – across multiple programming languages,...
Robotic Process Automation – an IAM Challenge
Blog
Robotic Process Automation – an IAM Challenge
Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform...
API Security: Separating Truth from Fiction
Webinar Recording
API Security: Separating Truth from Fiction
APIs (application programming interfaces) have undergone a truly amazing transformation in recent years. From an obscure technical term only software developers were familiar with, they have...
IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly
Webinar Recording
IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly
Making your service available to everyone, everywhere, without losing control. On their digital journey, businesses are constantly launching new digital services, chased by competitive and...
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
Webinar Recording
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops...
Andre Priebe - CIAM & API Management
Event Recording
Andre Priebe - CIAM & API Management
Customer Identity & Access Management und API Management sind als Business Enabler bekannt. Aber in Kombination sind sie sogar mehr als die Summe ihrer Teile.  Erfahren Sie, wie...
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Webinar Recording
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services...
Previous
7 8 9 10 11 12 13 Next