Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Accelerate Digital Trust: The Power of End-to-End Identity Proofing Platforms David Mattei - Aite-Novarica Group; Santosh Rajvaidya, Simon Winchester, Samer Attasi Nearly 90% of businesses have seen higher fraud losses since the pandemic began, most coming from online customer onboarding. But fraud doesn’t stop a... February 21, 2023 4:00pm 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 4 weeks ago | 61 mins Must-Haves in CI/CD Software Development for Embedded Ricardo Camacho, Sr Technical Product Manager A collaborative culture within organizations has been proven to streamline the product development process. It places value on effective communication... February 9, 2023 5:00pm 24 hours of Log4J within Barracuda's Security Operation Centre (SOC) Merium Khalid (Sr. SOC Manager, Offensive Security, Barracuda) Get an in-depth look at the Log4J Zero-Day Vulnerability and the strategies and solutions to protect your business from exploitation, including ransom... 2 hours ago | 30 mins Spreadsheets and Modern GRC Tools: 3 Things to Know Thomas Wilcox, Director of Compliance & IT Security - Hyperproof | Elizabeth Mattin, Director, GRC - Demandbase, Inc. Are you using spreadsheets to manage your IT compliance or risk programs? You might not know it yet, but your spreadsheets are holding you back. Fro... 17 hours ago | 58 mins OWASP Top 10: Security Logging and Monitoring Failures Jonathan Knudsen, Head of Global Research The “Security logging and monitoring failures” category, formerly known as “Insufficient logging and monitoring,” is now listed at #9 in the OWASP Top... February 15, 2023 5:00pm How to Use GitHub and Static Analysis in Your CI/CD Pipeline Ricardo Camacho - Dir. Regulatory Software Safety & Security Compliance A collaborative culture within organizations has been proven to streamline the product development process. It places value on effective communication... 2 weeks ago | 26 mins Best Practices for Effective Third-Party Security Risk Management Andrew Moyad, CEO, Shared Assessments, Shared Assessments, Dov Goldman, Director of Risk and Compliance, Panorays InfoSec, IT risk and digital supply chain management professionals know the key to minimizing the risk of third-party breaches: implementing a compreh... February 21, 2023 4:00pm State of SaaS Management 2023 - What we learned from 100+ IT professionals Marion Richter, Sr. Director Product Marketing – LeanIX | Vijay Mandeep, Product Marketing Manager - LeanIX Gartner predicts that annual SaaS expenditure will grow by more than 19%, yet 25% of this software will be underutilized or over-deployed. To better u... February 16, 2023 4:00pm How to help protect your organization with Managed Threat Detection and Response Haley Mathis: Senior PMM, AT&T Cybersecurity, Skylar Talley: Lead PMM - AT&T Cybersecurity With more access to resources than ever before, cybercriminals are rapidly scaling their operations and constantly shifting their tactics to exploit n... 2 days ago | 58 mins Load more