![Confusion and Planning for Zero Trust Architectures - TN Image](/sites/default/files/content/webinars/field_image/2022-04/confusion-and-planning-for-zero-trust-architectures-tn.jpg)
Microsoft & Thales: Confusion and Planning for Zero Trust Architectures
May 5, 2022
By now, US Government IT groups are well aware of Executive Order (EO) 14028 and the underlying promise to better…
![How to Protect Your Customer´s Sensitive Data - TN Image](/sites/default/files/content/webinars/field_image/2022-04/the-energy-sector-threat-tn.jpg)
The Energy Sector Threat: How to Protect Your Customer´s Sensitive Data
April 27, 2022
A major European energy company had to implement a data protection strategy to secure the critical infrastructures that…
![How can a shared security approach help ensure that your security is watertight - TN](/sites/default/files/content/webinars/field_image/2022-01/how-can-a-shared-security-approach-help-ensure-that-your-security-is-watertight-tn.jpg)
How can a shared security approach help ensure that your security is watertight?
April 26, 2022
You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security…
![DMEA](/sites/default/files/content/events/field_image/2022-04/DMEA_banner_SM_page.jpg)
DMEA – Connecting Digital Health\ Berlin
April 26, 2022 - April 28, 2022
When developing and marketing their digital products, software manufacturers and manufacturers of smart devices are…
![The Rise of the Virtual PKI Credential - TN Image](/sites/default/files/content/webinars/field_image/2022-04/the-rise-of-the-virtual-pki-credential-tn.jpg)
The Rise of the Virtual PKI Credential
April 20, 2022
With remote work becoming the new norm for many companies, organizations need to secure their employee’s work-from-home…