Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Building Security into DevOps Without Breaking It Steven Zimmerman, Product Marketing - Developer Solutions As development technologies become more fast-paced, modular, and automated, the tools and practices used to secure the software that passes through th... 6 days ago | 16 mins DAST to the Future Jeff Lawson, Product Management | Patrick Carey, Product Marketing Shifting the Modern Application Security Paradigm The emphasis on securing applications in development has not resulted in the reduction of breaches ... 6 days ago | 57 mins The Future of AppSec: What You Need To Know Chai Bhat, Product Marketing Manager A recent Forrester report reaffirms that “applications remain the most common attack vector.” The Synopsys Cybersecurity Research Center (CyRC) publis... February 23, 2023 10:00am 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 4 weeks ago | 61 mins Automagic API Security Testing Steve Chappell, SW Manager & API Security Evangelist Most API Security tools/platforms are built for the Security teams that are told “here’s an API service already running – go secure it”. Thus, they ta... 1 month ago | 30 mins See An ASOC Tool In Action Adrian Acuna, Senior Sales Engineer The right application security orchestration and correlation (ASOC) tool automates time-consuming application security workflows and makes software se... 2 months ago | 59 mins 6 Ways to Improve AppSec Accountability Adrian Acuna, Senior Sales Engineer AppSec teams often struggle to keep up with the rapid code releases produced by DevOps teams. Testing falls behind as development speeds up. Since slo... 3 months ago | 41 mins Tech in the classroom: The educator's guide to device lifecycle management Curtis Armstrong, Field Engineer, Jamf Let's be honest. IT admins face unexpected challenges like onboarding new and experienced teachers, introducing new technology, or distributing studen... 8 months ago | 22 mins OWASP Top 10: Identification and Authentication Failures Jonathan Knudsen, Head of Global Research Listed at #7 in the OWASP Top 10, identification and authentication failures include a variety of errors related to login and authentication. Learn ho... February 8, 2023 5:00pm How to Enhance Application Security and Quality with Fuzz Testing John McShane, Product Management | Andy Pan, Product Marketing Modern organizations rely on software to run their business, power their fleets, and manage critical communications infrastructure. Learn how to use ... February 9, 2023 7:00pm Load more