Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... February 7, 2023 10:00am 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... February 14, 2023 10:00am 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... February 28, 2023 10:00am AppSec Trends for 2022 and Beyond Eli Erlikhman, Director of Management Consulting In the world of application security (AppSec), it’s helpful to know what your peers are doing—what’s worked, what’s failed—and perhaps most importantl... 2 months ago | 39 mins 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... February 21, 2023 10:00am 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep 9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... March 7, 2023 10:00am 2021 OWASP Top 10: Server Side Request Forger - Ep10 John Wagnon, Solutions Architect, F5 SSRF flaws occur when a web app fetches a remote resource without validating the user-supplied URL. Attackers can coerce the app to send a request to ... March 14, 2023 10:00am Securing the Supply Chain with Multi-Signal Defense Kill Chain Spence Hutchinson, Principal Threat Researcher In this webinar, Spence Hutchinson, Principal Threat Researcher with eSentire’s Threat Response Unit (TRU), Spence discusses: - The top cyber threats ... 7 days ago | 35 mins Open Doors and Lost Keys: Gaining visibility across your external attack surface Todd Carroll, CISO & SVP Global Cyber Operations at CybelAngel Remember the Colonial Pipeline attack? A $2.4M ransom attack disrupted fuel supplies from one of the largest pipeline operators in the United States—a... February 8, 2023 4:00pm Chipotle: Gaining Full Visibility & Control of the Supply Chain with Better Data Hogan Le, Senior Manager - Governance and BI Systems at Chipotle; Thorwald Herbert, COO at Semarchy When Chipotle started their MDM journey, the first asset they wanted to master was their locations: all of their restaurants across North America and ... 3 weeks ago | 45 mins Load more