Activeboard inputs allow for users to easily change part of a widget’s query to see the data in a new way. These can transform simple charts into interactive tools for data analysis.
Max Aulakh, CEO of Ignyte Assurance Platform, interviews Michael Fulton, AVP IT Strategy and Innovation for Nationwide. Join the conversation as they discuss using an innovative interface to give agents the products they need, bringing the products to the customer, and cultural changes and how they impact the business.
In this webinar, JFrog and NeuVector will discuss the attack vectors in the pipeline and how to build security into the CI/CD process from build to ship to run-time. This will enable organizations to achieve Continuous Protection (CP) for their entire pipeline.
Ignyte CEO, Max Aulakh interviews Anupam Srivastava, Chief Information Security Officer for the State of Ohio discusses the impacts Ohio counties are making through technology, measures the state is taking to detect and combat security vulnerabilities, and bridging the gap in the talent pool.
Building secure, high-quality software is more challenging than ever. The bar is set high for organizations to release new features and functions without compromising the quality or security in the applications they deploy. Organizations are rapidly adopting DevOps tools and methodologies to keep up-with the demands of accelerated software delivery. They are also implementing application security testing earlier in their development workflow to develop and deploy quality code.
Neal Saling director of Ignyte Assurance Platform interviews Michael Hofherr, VP & CIO for The Ohio State University. Michael shares his thought leadership and discusses challenges and opportunities for IT in the university space, the role technology will play in the workforce over the next 10 years, how technology will change the higher education landscape for future students, and key leadership skills.
Jeff and Kevin meet up for “SOCtails” to chat about their experiences working in different SOCs (Security Operations Center). Kevin gets a security alert and opens his laptop to resolve it. Jeff shows Kevin a better way with Splunk Phantom.
This tutorial demonstrates how to retrieve credentials on Zoom developer website for use with the Zoom API. This tutorial covers (i) creating your application; (ii) retrieving your OAuth 2.0 client ID and client secret; as well as (iii) configuring your application scopes.
As cloud adoption matures, many organizations still struggle to determine the best approach for their environment. Tim Erlin, VP of Product Management and Strategy at Tripwire, breaks down what differentiates hybrid cloud from multi-cloud, and how enterprises are utilizing both to meet their needs.