Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 2 months ago | 61 mins Online Reviews – Your Cheat Code for Better Performance Zack Hamilton - Executive Practitioner, Forsta Are you leveraging your local marketing to drive performance? Join Zack Hamilton, Executive Practitioner, to learn how to make the most of your local... April 13, 2023 3:00pm Cyber Notes Cast - Credential Management a bunker for Code War senhasegura When asked, Thomas Waite - author of the book Lethal Code - “Why did he decide to write cyber thrillers?”, his answer was: “Because we've gone from th... 2 weeks ago | 14 mins Secure Code Review: Catching Vulnerabilities at the Source Dan Mateer, HackerOne, Will Barrett, Tranzito Security vulnerabilities discovered in applications are almost always rooted in security flaws in source code. Here, weaknesses may be logical errors,... 5 months ago | 34 mins California Privacy Rights Act: Understanding Your HR Compliance Obligations Jessica Clark and Lindley Fraley, CGL LLP Effective January 1, 2023, California became the first state to provide expansive privacy rights to employees. The new rights go well beyond existing ... 2 weeks ago | 43 mins Replace Manual Security Reviews w/ Automated App Security Testing For SAP Jonathan Cooper, Onapsis Sales Engineer We all know today's ongoing business acceleration is the main driver for Digital Transformation. As a result, increasing business demands for more and... 4 months ago | 28 mins MISRA C:2012 Amendment 3: What You Need to Know Ricardo Camacho, Director of Compliance, Miroslaw Zielinski, Director Product Mgmt & Michal Rozenau- Project Lead Engineer Do you want to incorporate the next-level safety and security coding guidelines to satisfy compliance requirements for the recently released MISRA C:2... 2 months ago | 38 mins The Lawyer's Guide to a Comprehensive Open Source Compliance Program Kate Downing, Law Offices of Kate Downing Note: This is the replay of a webinar that originally aired on Nov. 16, 2022. Today, nearly every company that builds applications uses open-source ... 2 months ago | 63 mins Securing Vehicles after Production: Vulnerability Management & Security updates Dennis Kengo Oka, Principal Automotive Strategist, Synopsys As the automotive software development life cycle puts greater focus on cyber security, we’ll see safer, more secure cars on the roads. OEMs and suppl... 2 years ago | 63 mins Application Security in Depth: Understanding the Three Layers of AppSec Testing Nabil Hannan, Samir Sherif, Moshe Zioni Today's approach to defense in depth for application security are siloed, lack context, and results have fallen short. But a layered approach is the k... 1 year ago | 57 mins Load more