Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Understanding Your Attack Surface Through Vulnerability Disclosure Marten Mickos, HackerOne Melissa Vice, DoD Cyber Crime Center (DC3) Chip Wentz, Keurig Dr. Pepper Inc. Having a vulnerability disclosure policy (VDP) helps improve network defenses and enhance mission assurance, helping you launch faster with less risk... 1 month ago | 59 mins Meltdown and Spectre Security Vulnerabilities In a Nutshell Jose Varghese; Souti Dutta A recently uncovered set of vulnerabilities that exist in modern computer processors built by Intel, AMD and ARM has shaken the InfoSec community and ... 4 years ago | 18 mins 2022 Cybersecurity Predictions: Top Five Threats James Carder, CSO and VP of Labs and Matt Sanders, Director of Security 2021 was a difficult year for security - and 2022 will likely be no different. From the recent Log4shell vulnerability to a growing remote workforce, ... 5 months ago | 50 mins How to Inject Security Into the Software Development Lifecycle Rob Simmons, Independent Threat Researcher, Chip Epps, Director Product & Solutions Marketing, ReversingLabs Digital transformation represents perhaps the most significant business challenge facing organizations today, with the promise of improving business p... 1 year ago | 59 mins Over 400 Vulnerabilities in Qualcomm's chip - Are you at Risk? Jonathan Shimonovich For the EMEA/APAC session: https://www.brighttalk.com/webcast/16731/431231 A new Check Point Research reveals more than 400 vulnerable pieces of code... 2 years ago | 63 mins Over 400 Vulnerabilities in Qualcomm's chip - Are you at Risk? Isaac Dvir, Director, Mobile Security & Prakash Bhaskaradass, Director, Threat Prevention (APAC) A new Check Point Research reveals more than 400 vulnerable pieces of code in one of Qualcomm Technologies DSP chips, which are embedded into over 40%... 2 years ago | 36 mins [APAC] 2022 Cybersecurity Predictions: Top Five Threats James Carder, CSO and VP of Labs and Matt Sanders, Director of Security CISOs must be proactive and stay informed of potential threats to better prepare for what's to come. In this webinar, LogRhythm’s CSO & VP of Labs, J... 3 months ago | 50 mins How to Inject Security Into the Software Development Lifecycle Rob Simmons, Independent Threat Researcher, Chip Epps, Director Product & Solutions Marketing, ReversingLabs Digital transformation represents perhaps the most significant business challenge facing organizations today, with the promise of improving business p... 1 year ago | 60 mins 2019 Internet Security Threat Report (ISTR): The New Threat Landscape Nick Savvides, Chief Technology Officer, APAC, Symantec As ransomware shows early signs of decline, new forms of attack emerge to take its place. Stealthy techniques allow attackers to fly under the radar, ... 3 years ago | 63 mins Cyber Supply Chains: Risks & Protection Curtis KS Levinson, VP Strategic Cyberspace Science, US Cyber Defence Advisor to NATO Cyber space is composed of, and dependent on, supply chains. Our hardware and software are created in multiple locations by a multitude of suppliers ... 6 years ago | 36 mins Load more