Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date DevSecOps: Implémenter la sécurité dans les chaînes DevOps Laurent Le Bourhis, Ingénieur Avant Vente Travailler en mode DevOps est désormais très répandu, et maintenant le mouvement DevSecOps est en plein essor. Mais l'intégration de la sécurité appli... March 29, 2023 9:00am 5 Considerations for a Smooth Replacement of NetScaler Yaron Azerual Citrix recently announced that they’ll soon turn their focus away from you and most customers anddevote all of their resources to their top 1600 custo... March 30, 2023 7:00am 5 Considerations for a Smooth Replacement of NetScaler Yaron Azerual Citrix recently announced that they’ll soon turn their focus away from you and most customers anddevote all of their resources to their top 1600 custo... March 30, 2023 3:00pm Open Source Risks with New Technologies: AI, GitHub Copilot, Blockchain & More Mark Radcliffe, DLA Piper, Anthony Decicco, GTC Law Group, Sam Ip, Osler, Hoskin, & Harcourt The evolution of newer technologies, like artificial intelligence, machine learning, GitHub Copilot, blockchain, cryptocurrencies, DeFi, APIs, contain... 6 days ago | 61 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 37 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 38 mins Container Security Essentials David Benas, Associate Principal Consultant, Synopsys As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applicatio... 3 weeks ago | 61 mins Coffee with a Dash of DAST Rod Musser, Director Product Management and Vishrut Iyengar, Product Marketing Manager at Synopsys Security breaches can happen at any time. You need to stay ahead of the game and secure your applications—now. But how can you overcome application se... 2 weeks ago | 26 mins Cloud workloads: Best practices onboarding apps to a Kubernetes-based platform Paul Whiten, Red Hat; Manu Joy, Red Hat and Somnath Banerjee, Red Hat After deciding which cloud migration approach to take, you need to understand the nuances of the platforms that will be running your workloads. Kubern... 1 hour ago | 60 mins [Radware & KIO] La protección de aplicaciones en el entorno digital Armando Jurado y Laura Castaño, KIO España | Esther Pascual, Radware Con la creciente transformación digital el entorno empresarial, las aplicaciones y las APIs se han convertido en una parte crítica del negocio. La may... March 28, 2023 8:30am Load more