Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date What is SAST? Corey Hamilton, Security Solutions Manager, Synopsys Static application security testing (SAST) is a key ingredient of any AppSec program. However, modern applications are built using processes, language... 4 days ago | 29 mins Destroying the Barrier to Sophisticated Detection and Response Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack. And your SOC team is drowning in alerts from the entire security stack. Something is broken—and that’s w... 1 month ago | 49 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 3 months ago | 38 mins A Visionary Approach to Cybersecurity David Finger, VP of Product & Solutions, Brook Chelmo, Director, Product & Solution, Cody Johnson, Sr. Threat Analyst The cyber threat landscape in changing faster than ever. Case in point: Over the past six months, FortiGuard Labs identified 10,666 new ransomware var... June 6, 2023 4:00pm 2023 AT&T Cybersecurity Insights Report: Edge Ecosystem Theresa Lanowitz,Head of Cybersecurity Evangelism,AT&T Business, Mark Freifeld, Lead Marketing Manager, AT& Cybersecurity The twelfth edition of the industry-leading AT&T Cybersecurity InsightsTM Report – Edge Ecosystem is here! The data is in, the analysis is complete, a... June 6, 2023 4:00pm Let’s Talk SOC: Ep1 - Defending the Defenders: Lessons Learned as a CISO Ken Deitz, Chief Security Officer & Chief Information Security Officer, Secureworks What We'll Cover - Maximizing talent to address risks: Minimizing the spend footprint - CISO: The evolution of the role - Security tech: Artifi... 4 days ago | 13 mins Winning with Weaponised Intelligence [EMEA] Ellis Fincham - EMEA Practice Manager - Threat & XDR, Rapid7 This time guest presenter Mike Owen, joins Ellis Fincham to discuss how to leverage external threat intelligence to deliver better security outcomes f... June 8, 2023 10:00am TIP Functionality That Moves the Needle Mark Bermingham, Willy Leichter Threat intelligence is only valuable if your organization can ingest, process, enrich, correlate, prioritize, and take action based on these threat in... 3 days ago | 46 mins Defending the Triple Threat Christopher Rodriguez (IDC), Steve Winterfeld (Advisory CISO, Akamai), Venkat Praneeth Nangineni (Product Manager, Akamai) Extortion is the criminal business model that is dominating the headlines. Join Akamai and IDC to hear about the most effective ways to stop the “Cybe... 3 days ago | 48 mins Mapping Attack Patterns to Detect Threats Mark Alba, Chief Product Officer, Anomali To move forward, we often reflect on the past. It’s no different in cybersecurity. Take, for instance, threat detection. In the early days of the in... 3 days ago | 24 mins Load more