Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Building Security into DevOps Without Breaking It Steven Zimmerman, Product Marketing - Developer Solutions As development technologies become more fast-paced, modular, and automated, the tools and practices used to secure the software that passes through th... February 2, 2023 10:00am A new approach for browser-based performance testing Bryan Cole To effectively verify performance under load, your performance testing strategy should include both protocol and browser-based testing. But traditiona... 1 week ago | 14 mins What the EU Cyber Resilience Act Means for AppSec Michael White, Technical Director and Principal Architect & Per-Olof Persson, Principal Solution Advisor Europe, Synopsys With the cost of cyberattacks predicted to cost $10.5 trillion by 2025, the European Commission is looking to transform the cybersecurity landscape th... February 7, 2023 9:00am Tech Talk: Security Edition Using Machine Learning for Hunting Security Threats Muath Saleh, Cyber Security Engineer & Hafiz Farooq, Cyber Security Architect, Matthias Maier, Security PMM Director Splunk Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for AI / Machine Learning based Analytics to supercha... 1 week ago | 40 mins Introducing NeoLoad 9: Embedded support for browser-based testing Bryan Cole, Brice Burty Join us for a first look at RealBrowser, a browser-based testing solution available in Tricentis NeoLoad’s latest release. RealBrowser supports any br... March 23, 2023 4:00pm Tech Talk: Security Edition Using Machine Learning for Hunting Security Threats Muath Saleh, Cyber Security Engineer & Hafiz Farooq, Cyber Security Architect, Matthias Maier, Security PMM Director Splunk Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for AI / Machine Learning based Analytics to supercha... 2 weeks ago | 40 mins 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 3 weeks ago | 61 mins An Engineer’s Guide to Signature Algorithms and EdDSA Judith Kahrer, Product Marketing Engineer, Daniel Lindau, Identity Specialist, Mark Dobrinic, Software Engineer, at Curity A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the securi... 3 weeks ago | 1 min Case Study - The ROI of Managed Risk-Based Vulnerability Management Josh Allen, PurpleSec CPO | Jason Firch, PurpleSec CEO Watch this case study webinar by PurpleSec on the ROI of managed risk-based vulnerability management (RBVM) for a leading travel services provider. He... February 2, 2023 5:00pm New ways to Monetise Tech Business Steve Hubert - Area Vice president As tech businesses move away from traditional selling models the industry has seen a shift to subscription management and anything as a service. From ... February 2, 2023 10:00am Load more