Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... June 8, 2023 9:00am Accelerate CI/CD Feedback for Feature Branch Development Ruben Wildeboer, Solution Architect Managing code branches for new features is handled most effectively when properly integrated into your CI/CD pipeline and processes. High performing t... 1 month ago | 43 mins How Risk Signals Can Enhance ID Verification in the Hospitality Industry Casey Nelson (Jumio), Tim French (Jumio), Chris Howell (Jumio), Sathish Durairaj (Jumio) Join us on Thursday, May 4 at 2pm ET as we share the latest updates to Jumio’s KYX orchestration platform. We will review frictionless risk signals th... 4 weeks ago | 50 mins Online Reviews – Your Cheat Code for Better Performance Zack Hamilton - Executive Practitioner, Forsta Are you leveraging your local marketing to drive performance? Join Zack Hamilton, Executive Practitioner, to learn how to make the most of your local... 2 months ago | 28 mins Easily Stop Malware, Before Your Company Becomes Liable (and Broke) Brian Fox and Tara Flynn Condon Governments around the world are making secure software development an organizational imperative. For instance, proposed regulations like the EU Cyber... 1 week ago | 29 mins Cyber Notes Cast - Credential Management a bunker for Code War senhasegura When asked, Thomas Waite - author of the book Lethal Code - “Why did he decide to write cyber thrillers?”, his answer was: “Because we've gone from th... 3 months ago | 14 mins Secure Code Review: Catching Vulnerabilities at the Source Dan Mateer, HackerOne, Will Barrett, Tranzito Security vulnerabilities discovered in applications are almost always rooted in security flaws in source code. Here, weaknesses may be logical errors,... 7 months ago | 34 mins SH#FT Happens!! How To Deploy DevSecOps principles In The Development Lifecycle Joylynn Kirui | Senior Cloud Security Advocate (Microsoft) With every commitment, the threat landscape increases. One single vulnerability is all a hacker needs. Vulnerabilities have multiple sources, and you ... 1 month ago | 47 mins Replace Manual Security Reviews w/ Automated App Security Testing For SAP Jonathan Cooper, Onapsis Sales Engineer We all know today's ongoing business acceleration is the main driver for Digital Transformation. As a result, increasing business demands for more and... 6 months ago | 28 mins Develop Software Fearlessly Software Supply Chain Security in 2023 Brian Fox (Sonatype), Stephen Magill (Sonatype), Katy Hiller (Sonatype) Malicious software supply chain attacks have increased an average of 742% per year since 2019. As this trend continues, you'll need to know how to eff... 3 weeks ago | 29 mins Load more