Search results


Smart Rooms, Smarter Care: Samsung’s Impact on Hospital Efficiency

Smart Rooms, Smarter Care: Samsung’s Impact on Hospital Efficiency

Channel Logo
Samsung Speakers: James Rose, Director of Healthcare, Lisa Bohnsack, Sr. Manager Central, Lisa Gilmour, Sr. Manager West, Steve Stumberg, Sr. Manager East, Connection Speaker: Jennifer Johnson, Director of Healthcare Strategy

Effective communication lies at the heart of patient-centered care. In this webinar, Connection and Samsung tackle the challenges faced by hospitals and
healthcare organizations. We’ll explore innovative solutions that bridge gaps—between patients and staff, between technology and healing. 1. The Digital
Front Door: Patients expect hotel-like amenities in hospital rooms. But how does Samsung translate the digital front door experience to the patient’s actual r…

Securely Open the Digital Front Door for your Customers

Securely Open the Digital Front Door for your Customers

Channel Logo
Aubrey Turner, Executive Advisor, Ping Identity

WHAT YOU'LL LEARN Meet your customers where they are at with new online and mobile experiences for them to seamlessly interact with your brand. But
opening the digital front door to your business should only make it easy for your customers to engage with your brand, not bad actors. It’s a delicate balance
between customer security and convenience. Too many security controls could cause frustration. Not enough security controls could open the business up f…

Business as Usual in Testing Times - IT/ ITeS Virtual Roundtable Discussion

Business as Usual in Testing Times - IT/ ITeS Virtual Roundtable Discussion

Channel Logo
Rahul Neel Mani - Editor, Dynamic CIO

As we navigate the challenges posed by COVID-19 a new normal is set to emerge: most organizations are looking at ‘working from home’ as a viable solution
to both reduce the operational burden and increase productivity. As a result, there will be a situation wherein employees will have to sign in remotely to
corporate networks and access data through cloud-based applications. But this shift will surely create a new, target-rich environment for scammers, hacker…

Integrating Secure Code Signing in the CI/CD Pipeline

Integrating Secure Code Signing in the CI/CD Pipeline

Channel Logo
Ryan Sanders, Director of Product Marketing Eric Mizell, VP Field Engineering

Code signing is a powerful method to protect the integrity of containers, artifacts, and software across the CI/CD pipeline. But signing is more than just
certificates and signatures. It’s about integrating the sign and verify process into your pipeline while keeping sensitive keys secure and in the right hands. If
signing processes aren’t secure, it opens to door to malware, exploits, and supply chain attacks. Join Eric Mizell, VP of Solutions Engineering, and Ryan Sand…

Integrating Secure Code Signing in the CI/CD Pipeline

Integrating Secure Code Signing in the CI/CD Pipeline

Channel Logo
Ryan Sanders, Director of Product Marketing Eric Mizell, VP Field Engineering

Code signing is a powerful method to protect the integrity of containers, artifacts, and software across the CI/CD pipeline. But signing is more than just
certificates and signatures. It’s about integrating the sign and verify process into your pipeline while keeping sensitive keys secure and in the right hands. If
signing processes aren’t secure, it opens to door to malware, exploits, and supply chain attacks. Join Eric Mizell, VP of Solutions Engineering, and Ryan Sand…

Find the balance between customer experience and security - How CIAM can help

Find the balance between customer experience and security - How CIAM can help

Channel Logo
Jim Katsos, Senior Manager, Solutions Engineering - Okta

Did you lock the front door? The login page is the front door for your customers. It’s the first thing they see, so the login flow needs great UX. At the same
time, it’s the first place many hackers target when looking for a vulnerability to exploit in their attempts to steal your data, so it’s got to be secure as well —
it’s up to you to determine how well secured. How to find the balance between customer experience and security and in the meantime acquire more new c…

Securing Microservices with Spring and Pivotal Cloud Foundry

Securing Microservices with Spring and Pivotal Cloud Foundry

Channel Logo
Simon Rowe, Pivotal

Microservices offer advantages and disadvantages for security. Microservices can be developed, updated, and scaled separately. However, with more and
more microservices to manage, there are numerous doors that intruders can access within an application. While their isolated and standalone structure
within applications makes them easier to defend, microservices bring with them their own additional security challenges. In this talk, we'll walk through a s…

Integrating Secure Code Signing in the CI/CD Pipeline

Integrating Secure Code Signing in the CI/CD Pipeline

Channel Logo
Ryan Sanders, Sr. Dir Product & Customer Mktg & Eric Mizell, VP of Field Engineering Keyfactor; Brandon Dunlap, Moderator

Code signing is a powerful method to protect the integrity of containers, artifacts, and software across the continuous integration and continuous deployment
(CI/CD) pipeline. However, signing is more than just certificates and signatures. It’s about integrating the sign and verify process into your pipeline while
keeping sensitive keys secure and in the right hands. If signing processes aren’t secure, it opens the door to malware, exploits, and supply chain attacks. On…