Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... June 8, 2023 9:00am Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 7:00am Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 12:00pm Pros & Cons of Generative AI in Software Testing Adam Attanasio, Product Manager & Renata Santillan, Product Marketing Strategist The evolution of artificial intelligence is a current hot topic. What exactly does it entail? Generative AI tools like CoPilot and ChatGPT offer a 30-... June 21, 2023 4:00pm Protect Your Business From Data Privacy Leaks Using Automated Security Testing James Croall, Product Management Director, Synopsys Join us for a webinar on the automated source code data protection measure with James Croall, Product Management Director, Synopsys. James will discus... 3 months ago | 39 mins How to Integrate Static Analysis Into Your CI/CD Azure Pipeline for Embedded Ricardo Camacho - Director Regulatory Software Safety & Security Compliance A collaborative culture within organizations has been proven to streamline the product development process. It places value on effective communication... 1 month ago | 36 mins Integration of Automated Security Tools in CI/CD Pipelines Meera Rao, Senior Director - Product Management (DevOps Solutions) Development organizations continue to implement security earlier in the continuous integration/continuous delivery (CI/CD) pipeline. And the benefits ... 7 months ago | 60 mins Everything You Need to Know About Structural Code Coverage for C & C++ Ricardo Camacho - Dir. Regulatory Software Safety & Security Compliance & Zak Maiga - Solution Architect Structural coverage is the identification of code that has been executed and logged. There are several reasons why it's important to perform this acti... 3 months ago | 58 mins Telco Market Trends and Key Cybersecurity Considerations Fortinet's Jonathan Nguyen-Duy, Ronen Shpirer, Pablo Molinero Telco Service Providers are at the center of today’s digital ecosystem and play a key role facilitating the exchange of the data and enabling the esse... June 6, 2023 9:00am Securing the Modern Enterprise: Securing the New Edge Carrie Goetz, StrategITcom, LLC; Chris Hinsz, Fortinet & Salvatore Salamone, Network Computing Distributed composite applications, cloud, and work from anywhere are the norm today. Unfortunately, the adoption of these technologies and strategies... June 6, 2023 4:00pm Load more