Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date DevSecOps: Implémenter la sécurité dans les chaînes DevOps Laurent Le Bourhis, Ingénieur Avant Vente Travailler en mode DevOps est désormais très répandu, et maintenant le mouvement DevSecOps est en plein essor. Mais l'intégration de la sécurité appli... 2 months ago | 35 mins A Modern Approach to Application Security Janet Worthington, Sr Analyst | Jeff Lawson, Product Mgmt | Peter Monahan, Dir, SA | Vishrut Iyengar, Product Marketing Securing today's applications requires a new approach. You need to deliver new applications and API’s, fast. Unfortunately, this “need for speed” can... 6 months ago | 58 mins Top 5 Use Cases for Threat Intelligence Platforms (TIP) Mark Bermingham, Mark Carosella This Lunch-and-Learn webinar will highlight the key use cases for a modern Threat Intelligence Platform (TIP) and show live demonstrations of how Cywa... 21 hours ago | 31 mins First Line of Defense: The State of the Security Team Andrew Hollister, LogRhythm CISO and Kevin Kirkwood, LogRhythm deputy CISO. Cybersecurity is not a one-person job, but rather an entire organizational effort. In 2022, LogRhythm sought to understand the current state of the se... 2 days ago | 52 mins Fighting Ransomware with Vulnerability Management Andrew Pearson: Principal Security Engineer, Clint Harris, Principal Architect 2, Geoff Mefford, Cybersecurity Consultant 3 Ransomware is one of the biggest threats for organizations nowadays. The expectation is that this threat will grow even further. That is because ranso... June 13, 2023 4:00pm Security and the DevSecOps Platform: Approaches, Methods, and Tools Arlen Baker, Principal Security Architect, Wind River Only 8% of organizations have secured at least 75% of their cloud-native apps using DevSecOps (Enterprise Strategy Group). DevOps is enabling faster... 3 days ago | 41 mins Business Email Compromise: How AI Has Changed the Playing Field Dr Rebecca Wynn, Click Solutions Group | Kate Fazzini, CEO, Blue Line Recoveries Business Email Compromise (BEC) is an example of a phishing attack, used to steal money and/or sensitive corporate data. No organisation is immune to ... 2 days ago | 31 mins The Hidden Potential of DNS in Security Cricket Liu, Ross Gibson and Josh Kuo DNS is a foundational element of network communications and is also the starting point for countless cyberattacks. Threat actors abuse DNS to install ... 3 days ago | 55 mins 2023 Data Breach Investigations Report (DBIR) for SMB Verizon When cybercrime makes the news, it is typically because a large organization has fallen victim to an attack. However, small organizations are just as ... 2 days ago | 42 mins Meaningful Metrics: Mastering Cloud Security KPIs [EMEA] David Brookes-Smith, Cloud Security Specialist - Rapid7 Join David Brookes-Smith and guest presenter Jason Hart, EMEA CTO at Rapid7, to discuss how clients are tackling the problem of measuring the success ... June 15, 2023 10:00am Load more