Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date DAST to the Future Jeff Lawson, Product Management | Patrick Carey, Product Marketing Shifting the Modern Application Security Paradigm The emphasis on securing applications in development has not resulted in the reduction of breaches ... 2 months ago | 57 mins Container Security Essentials David Benas, Associate Principal Consultant, Synopsys As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applicatio... 3 months ago | 61 mins 10x IT Security Management with Your Endpoint Management Solution Keanan Ball, Sr. Director of Product Marketing As the macro Economic climate worsens Ransomware attacks increasing at a near exponential velocity. To no just survive the onslaught, but to get ahead... June 7, 2023 10:00am Automating Cyber Risk Management with FortifyData and Nanjgel Solutions Jude Pereira, CEO of Nanjgel, and David Oliveira, Director at FortifyData Automating Cyber Risk Management with FortifyData and Nanjgel Solutions: Reducing cyber risk by automating continuous asset discovery and assessments ... 2 weeks ago | 49 mins Tanium + Microsoft: Advanced Zero Trust and Rapid Incident Response at Scale Christopher Hallenbeck, CISO, Tanium * Michael Fiorina, Sr. Director, * Tanium Christopher Hallum, Director, Tanium Managing and securing your IT estate is getting more difficult as your attack surface continues to expand and the attacks on it increase in parallel. ... June 8, 2023 3:00pm Web Application Security is Broken. What Comes Next? Eyal Arazi, Senior Product Marketing Manager at Radware Whether it is a new web application architecture creating new threat surfaces, new zero-day attacks challenging traditional security mechanisms, or th... June 7, 2023 2:00pm DNS Security Risks and Systems: AN OPEN DEMO Peter LaMantia, Founder and CEO Phishing, malware, and credential theft are top cyber threats. Corporations spend millions to mitigate exposures, yet compromises continue to damage ... 6 days ago | 21 mins Attack Surface Management: Improve your cyber resiliency Andrew Pettet, Mandiant Sales Engineer, Jay Christiansen, Mandiant Red Team Consulting Manager How do you find and protect all of your external-facing assets? Is your attack surface vulnerable to attack? What do the hackers see? With new advan... 1 month ago | 42 mins A defense-in-depth approach to defending web apps Nathan Neo, Solutions Engineer, Cloudflare | Sasidhar Vellamcheti, Principal Solutions Engineer, Cloudflare In this live webinar, our security experts will show a comprehensive demo on identifying risk/gaps within your business process and how to improve you... June 14, 2023 5:30am How a threat actor really views your organization Anne Marie Zettlemoyer, Chief Security Officer, CyCognito and Marc Rogers, Head of Security for DEF CON There is a well-known maxim in the cybersecurity industry that cybersecurity tools are always one step behind threat actors. This statement exists bec... 3 weeks ago | 31 mins Load more