Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Everything You Need to Know About Structural Code Coverage for C & C++ Ricardo Camacho - Dir. Regulatory Software Safety & Security Compliance & Zak Maiga - Solution Architect Structural coverage is the identification of code that has been executed and logged. There are several reasons why it's important to perform this acti... 3 hours ago | 58 mins Integrated data center management in a new world Jeremy Clute, VP of Business Development, Nlyte Software Over the past year, data center operators have been adjusting to greater scrutiny from the public and governing bodies. This scrutiny has translated i... 4 hours ago | 60 mins Open Source Risks with New Technologies: AI, GitHub Copilot, Blockchain & More Mark Radcliffe, DLA Piper, Anthony Decicco, GTC Law Group, Sam Ip, Osler, Hoskin, & Harcourt The evolution of newer technologies, like artificial intelligence, machine learning, GitHub Copilot, blockchain, cryptocurrencies, DeFi, APIs, contain... 3 hours ago | 61 mins Achieving DevSecOps: Ways to reduce AppSec noise at scale Steven Zimmerman, Synopsys To build security into DevOps and achieve true DevSecOps, organizations need to manage AppSec workflows without hindering speed and flexibility. But h... March 23, 2023 10:00am Taking Zero Trust to 100%: Best Practices to Support your Journey Alexandra Willsher, Forcepoint | John Leonard, Computing | Anne Cockshott, The Channel Company EMEA Zero Trust is widely regarded as the best approach for protecting organizations, but implementing it is a journey rather than a one-off purchase. The... 10 hours ago | 38 mins DevSecOps: Implémenter la sécurité dans les chaînes DevOps Laurent Le Bourhis, Ingénieur Avant Vente Travailler en mode DevOps est désormais très répandu, et maintenant le mouvement DevSecOps est en plein essor. Mais l'intégration de la sécurité appli... March 29, 2023 9:00am How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 2 weeks ago | 28 mins What the EU Cyber Resilience Act Means for AppSec Michael White, Technical Director and Principal Architect & Per-Olof Persson, Principal Solution Advisor Europe, Synopsys With the cost of cyberattacks predicted to cost $10.5 trillion by 2025, the European Commission is looking to transform the cybersecurity landscape th... April 5, 2023 9:00am Rocket + Zia: How Automation Fixes Insurance Company Content Management Problems Eric Howse, Enterprise Sales Director at Zia Consulting, and William Davit, Senior Account Executive at Rocket Software Customers choose insurance companies that are easy to work with. But insurance companies are tasked with a contradictory goal: improving profitability... 2 hours ago | 46 mins Tech Talk: Software Supply Chain Security Marco Palella, Sales Engineer, Zilla Security In this highly informative talk, Zilla Sales Engineer, Marco Palella, discusses how the software supply chain gets exploited by malicious actors and w... March 23, 2023 5:00am Load more