Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Future of AppSec: What You Need To Know Chai Bhat, Product Marketing Manager A recent Forrester report reaffirms that “applications remain the most common attack vector.” The Synopsys Cybersecurity Research Center (CyRC) publis... February 23, 2023 10:00am 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... February 14, 2023 10:00am Fondations d'un programme global de sécurité applicative Hugues Martin, Ingénieur Avant-Vente, Synopsys Nos technologies, processus, et activités reposent tous sur des logiciels pour fonctionner, des logiciels auxquels il est nécessaire de pouvoir se fie... 2 weeks ago | 37 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 weeks ago | 28 mins 5 Ways to Establish Zero Trust in the Cloud with Orca Security and AWS Ty Murphy, Director of Product Marketing at Orca Security & Dudi Matot, Security Segment Lead at AWS Establishing a Zero-Trust program is a critical strategy to help security teams govern security across cloud and on-premise environments. As an AWS So... February 16, 2023 7:00pm 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 4 weeks ago | 61 mins A Modern Approach to Application Security Janet Worthington, Sr Analyst | Jeff Lawson, Product Mgmt | Peter Monahan, Dir, SA | Vishrut Iyengar, Product Marketing Securing today's applications requires a new approach. You need to deliver new applications and API’s, fast. Unfortunately, this “need for speed” can... 2 months ago | 58 mins DevSecOps: Implémenter la sécurité dans les chaînes DevOps Laurent Le Bourhis, Ingénieur Avant Vente Travailler en mode DevOps est désormais très répandu, et maintenant le mouvement DevSecOps est en plein essor. Mais l'intégration de la sécurité appli... March 29, 2023 9:00am How Dow Chemical Leverages Onapsis for Proactive Security & Compliance Brian Tremblay Compliance Practice Leader - Onapsis, Jeff Miller CISA, CISSP Cybersecurity Manager - The Dow Chemical Company Traditionally, cybersecurity and compliance have been two very separate functions where oftentimes the misalignment has been emphasized more than alig... 3 hours ago | 56 mins The Collaborative Approach to Cybersecurity Jennifer Mitchell, Chief of Staff | Gwen Way, Technical Account Team Manager With attention given to cybersecurity awareness month, Jennifer Mitchell, Chief of Staff and Gwen Way, Technical Account Team Manager with ActZero, di... February 7, 2023 4:00pm Load more