Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Software Construction & Business Risk: Best Practices for Software Due Diligence Declan Burns and Phil Odence, Synopsys The purpose of software due diligence is to identify risks in software. Understanding how software is developed and what kinds of issues can lurk in t... 2 months ago | 60 mins The 2022 Open Source Year in Review Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general co... 2 months ago | 67 mins Software Construction & Business Risk: A Crash Course for Investors and Lawyers Declan Burns & Phil Odence, Synopsys If you’re involved in software due diligence, you understand that acquiring software assets can bring any number of risks. By learning how software is... 4 months ago | 59 mins Cryptocurrency Threat Landscape Trends in 2023 Vitaly Kamluk, Dan Demeter Despite the recent cryptocurrency market downturn, cybercriminals continue keeping a close eye on crypto technologies and advancing their attacks on c... March 28, 2023 2:00pm Collecting Custodian Data to Prepare for Review Lisa Neyen, Lead Software Developer for Cellebrite Enterprise Solutions Collecting what is needed from endpoints regardless of location, is critical in today’s hybrid working environment. Corporate investigators and eDisco... March 30, 2023 5:00pm Illuminate the Blind Spots: Why your security investments are failing Dawid Kowalski - Senior Director Field Engineering, EMEA, FireMon We all know the story. The threat landscape is ever-evolving and security teams have to stay ahead of the curve and protect their networks. But what i... 5 days ago | 48 mins Ransomware groups negotiation tactics: what you need to know Marc Rivero, senior security researcher, Global Research and Analysis Team, Kaspersky Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the a... 4 days ago | 39 mins Account Takeover in Azure's API Management Developer Portal Thomas Stacey API Management is a critical component of modern application development. As organizations increasingly rely on APIs to exchange data between systems,... March 28, 2023 2:00pm Identifying and Triaging Security Risks in your Organization Joshua Barone, Senior Developer III at Cellebrite Organizations of all sizes are at constant risk of data breaches and security incidents that could disrupt business operations from a variety of malic... April 11, 2023 5:00pm Live Demo - Attack Surface Management and Immediate Threat Response Arien Seghetti, Solutions Architect At times of uncertainty, it’s essential to conduct self health-checks. Managing cybersecurity risk exposure, especially in light of new threats and ze... 3 weeks ago | 31 mins Load more