Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Building Security into DevOps Without Breaking It Steven Zimmerman, Product Marketing - Developer Solutions As development technologies become more fast-paced, modular, and automated, the tools and practices used to secure the software that passes through th... 2 days ago | 16 mins Coffee with a Side of DevSecOps Steven Zimmerman, DevSecOps Solution Manager, Synopsys To build security into DevOps and achieve true DevSecOps, organizations need to manage AppSec workflows without hindering speed and flexibility. But h... 3 days ago | 41 mins Protect Your Apps and APIs to Thrive in a Multi-Cloud World Keiron Shepherd, Senior Solutions Architect - F5 With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. However, as appli... 3 days ago | 35 mins Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 7:00am Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 12:00pm Reduce Complexity of Scaling Cloud-Native Applications with Red Hat & Nutanix Harsha Kotikela, Director of Product and Solutions Marketing When creating modern cloud-native applications that span from edge to datacenter to cloud, legacy 3-tier infrastructure is just not enough. Scalabilit... 1 week ago | 28 mins Session 2: Protect Your Apps and APIs across a Distributed Cloud Richard Bible, F5 Senior Solutions Engineer With cloud architectures, protecting both the application business logic and the underlying infrastructure is paramount. With the F5 Distributed Cloud... 2 weeks ago | 32 mins What is SAST? Corey Hamilton, Security Solutions Manager, Synopsys Static application security testing (SAST) is a key ingredient of any AppSec program. However, modern applications are built using processes, language... 1 week ago | 29 mins Business Email Compromise: How AI Has Changed the Playing Field Dr Rebecca Wynn, Click Solutions Group | Kate Fazzini, CEO, Blue Line Recoveries Business Email Compromise (BEC) is an example of a phishing attack, used to steal money and/or sensitive corporate data. No organisation is immune to ... 2 days ago | 31 mins How to Supercharge Your Business Applications with Software-Defined Storage Maggie Smith, Sr. Solutions Manager and Santhosh Siruvole, Sr. Product Marketing Manager With more data coming into more applications than ever before, performance, security and efficiency are on the minds of IT leaders at every organizati... 2 days ago | 36 mins Load more