Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... November 2, 2022 10:00am 2021 OWASP Top 10: Injection - Ep 3 John Wagnon, Solutions Architect, F5 Injection is a broad class of attack vectors where untrusted input alters app program execution. This can lead to data theft, loss of data integrity, ... September 28, 2022 9:00am Sensitive Data Monitoring with Tanium Sam Rajachudamani, Senior Director, Portfolio Strategy, Tanium and Jason Stough, Director, Product Management, Tanium Join this webinar hosted by Tanium to learn how you can quickly identify and manage the risk of sensitive data exposure across your environment and se... August 30, 2022 2:00pm How to Detect Hidden Security Flaws in IoT John McShane, Senior Security Product Manager | Andy Pan, Senior Product Marketing Manager By 2025 it is estimated that there will be 25.2 billion connected devices. As vehicles, networks, and industrial systems depend on interconnectivity, ... 3 weeks ago | 28 mins DEVICE ID: The Future of Programmatic Advertising Taylor Wheeler, Director of Digital Sales & Marketing Device ID is a unique code for each individual mobile device in the world. And according to Statista, there are over three billion smartphone users. C... 4 months ago | 9 mins CPE | Preparing for Ransomware with the NIST Cybersecurity Framework Colin Whittaker with subject matter experts from Netwrix, Alert Logic, and Reciprocity. Earn 1.5 CPE Credits on this webinar Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to re... September 22, 2022 5:00pm Safeguarding Device Integrity in the Supply Chain and Beyond Andrew Regenscheid (NIST), John Loucaides (Eclypsium) While most organizations are accustomed to dealing with external threats such as malware, the technology supply chain itself has rapidly emerged as an... 11 months ago | 62 mins Safeguarding Device Integrity in the Supply Chain and Beyond Andrew Regenscheid (NIST), John Loucaides (Eclypsium) While most organizations are accustomed to dealing with external threats such as malware, the technology supply chain itself has rapidly emerged as an... 1 year ago | 61 mins Securing critical infrastructure via Automation, Analytics, and Asset Integrity Charlie Harry, PhD, Tony Vicinelly, Pete Tseronis The Data Center: Securing this critical infrastructure via Automation, Analytics, and Asset Integrity With the potential risk of outages within your ... 4 months ago | 41 mins Improve Device Security Using The CMMC Framework John Loucaides, VP R&D, Eclypsium Build device security into your overall cybersecurity plan with simple steps that help you progress from basic cyber hygiene to preventing advanced pe... 11 months ago | 55 mins Load more