You searched for Media Trust | Page 2 of 190 | SC Media

Your search for Media Trust returned 1892 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for Media Trust returned 1892 results

Sort Results:

Relevant Recent
WebCast

Zero trust & the ID-based cybersecurity perimeter

The rapid adoption of cloud-first strategies - across multiple cloud computing flavors (SaaS, PaaS, IaaS, and more) - combined with the sudden uptick in work-from-home environments hastened employees’ need for access to apps and other IT resources from anywhere. These events require companies to consider a new cybersecurity perimeter. It’s not that network-based protection/detection controls are dead: they are simply inadequate for a Zero Trust security approach.
WebCast

Are You Ready for Zero Trust? Securing your network by verifying and validating everything

Since its introduction nearly a decade ago, the zero-trust security model has gradually made its way into cybersecurity’s mainstream. Zero trust’s opportunity — the increasing desire for silo-free, agile operating environments — also represents the biggest obstacle to its successful adoption: How does an organization enable free and open interaction while ratcheting up validation and verification to an absolute degree?
SC Awards

The 2020 Trust Award winners

Here’s a look at which solutions took home the top Trust honors and why, and what some of the winning companies have experienced in the months since the award presentation in February.
Cyber Veterans

Teresa Shea: building trust between private, public sectors

Having transitioned from the public sector to the private, Teresa Shea recognizes the need for those two verticals to work better together. The mutual skepticism bordering on distrust, which has been omnipresent for years, is both inefficient and unwarranted.
WebCast

Zero trust & the ID-based cybersecurity perimeter

The rapid adoption of cloud-first strategies — across multiple cloud computing flavors (SaaS, PaaS, IaaS, and more) — combined with the sudden uptick in work-from-home environments hastened employees’ need for access to apps and other IT resources from anywhere. These events require companies to consider a new cybersecurity perimeter. It’s not that network-based protection/detection controls are dead: they are simply inadequate for a Zero Trust security approach.
WebCast

Zero Trust in Practice: The Art of the Possible

This new SC Media virtual conference will help you understand the leading strategic approaches to adopting a zero-trust model. The event will feature leading experts who will dive deep into the discipline’s key components, including a full zero trust architecture, where organizations struggle in reaching zero trust, gaining granular visibility into your network and much more.
RiskSec 2020, Security News

Box security chief: Define your boundaries of trust

Digital transformation can bring new capabilities. But it can also introduce vulnerabilities, requiring security leaders to redefine the “boundaries of trust,” says the global chief information security officer at Box. Lakshmi Hanpal, who previously worked for SAP, Ariba, PayPal and Bank of America, will address that delicate balance between digital enablement and increased risk during…
Next post in Data Breach