Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!
From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security
In this program, our expert speakers will discuss five key areas to ensure your cloud security coverage is complete. We’ll dive into unique challenges that come with securing complex cloud environments and provide you with streamlined strategies to address them. Plus, we’ll show you how to leverage the data you ...
Read More
April 5, 2023
Lacework
Securing Kubernetes With SentinelOne and AWS
Join builders from SentinelOne and Amazon Web Services (AWS) for a live webinar where they’ll provide practical approaches to securing your Kubernetes clusters. This session will cover common attack vectors, security considerations when choosing a Kubernetes platform and strategies and best practices for detecting and resolving security incidents. You’ll also ...
Read More
April 5, 2023
SentinalOne
Key Strategies for a Secure and Productive Hybrid Workforce
In the current hybrid workforce environment, organizations are in a constant battle to balance security and productivity. Legacy architectures aren’t sufficient for today’s work-from-anywhere, distributed teams, but most organizations struggle to modernize to address security and productivity challenges. To optimize for remote and in-office users, organizations need to provide secure ...
Read More
April 4, 2023
Zscaler
Software Supply Chain Security
In the wake of a series of high-profile breaches, it’s become apparent how vulnerable software supply chains really are. Cybercriminals have increased their efforts to compromise developer credentials so they can embed malware in software components that can be activated downstream when they’re included in an application. Cybersecurity teams are ...
Read More
March 20, 2023
Security Boulevard
SaaS-Based Container Networking and Security on Amazon EKS
Organizations are adopting Kubernetes on Amazon Web Services (AWS) to modernize their applications. But Kubernetes clusters and application life cycles demand a considerable investment of cost and resources, especially for edge applications. Rafay’s SaaS platform, hosted on AWS Elastic Kubernetes Services (EKS), helps DevOps and platform teams deploy, scale and ...
Read More
February 28, 2023
AWS w/ Tigera
Three Steps to Software Supply Chain Security Success in 2023
Join software security experts as they walk through 3 steps for securing your software supply chain and achieving security mandates in 2023 ...
Read More
February 22, 2023
ActiveState
Headwinds, Crosswinds and Tailwinds: Securing the Cloud in Turbulent Times
As we head toward an unpredictable 2023, Prisma® Cloud CSO Bob West and senior director of product marketing Charles Goldberg sit down to chat about cloud security as it relates to current events. West and Goldberg unpack the conversations happening among IT professionals, business leaders and at the board level ...
Read More
February 21, 2023
Prisma Cloud by Palo Alto Networks
Where Will DevSecOps ‘Shift’ Next?
DevOps is terrific for delivering new innovative applications to the market. But the newer trend of “shift left, shift right, shift everywhere” has increased the pressure on developers and DevOps engineers to add application security (AppSec) testing and tooling management in CI/CD pipelines to their already long list of responsibilities ...
Read More
February 15, 2023
Synopsys
Understanding Cyber Insurance Identity Security Requirements for 2023
In this program, we’ll take a deep dive into both the risk management and identity protection aspects of the new cyber insurance requirements ...
Read More
February 15, 2023
Silverfort
AI in Machine Learning
Cybersecurity teams remain chronically overworked and short-staffed. It’s clear that AI must play a role in augmenting these cybersecurity teams, but there’s still a long way to go before AI models help level the playing field between cyberattackers and defenders. Many of the routine analytics tasks that are performed manually ...
Read More
February 13, 2023
Security Boulevard