Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... 1 week ago | 45 mins Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... 1 week ago | 45 mins Making It All Work Jeff Lawson, Product Management | Peter Monahan, Dir., Solutions Architecture | Vishrut Iyengar, Product Marketing A Practical Guide to Operationalizing the Modern AppSec Framework You need to modernize your application security program and you know how you are go... 3 weeks ago | 59 mins Software Construction & Business Risk: Best Practices for Software Due Diligence Declan Burns and Phil Odence, Synopsys The purpose of software due diligence is to identify risks in software. Understanding how software is developed and what kinds of issues can lurk in t... 2 months ago | 60 mins Integration of Automated Security Tools in CI/CD Pipelines Meera Rao, Senior Director - Product Management (DevOps Solutions) Development organizations continue to implement security earlier in the continuous integration/continuous delivery (CI/CD) pipeline. And the benefits ... 5 months ago | 60 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 weeks ago | 28 mins 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 3 months ago | 61 mins A Modern Approach to Application Security Janet Worthington, Sr Analyst | Jeff Lawson, Product Mgmt | Peter Monahan, Dir, SA | Vishrut Iyengar, Product Marketing Securing today's applications requires a new approach. You need to deliver new applications and API’s, fast. Unfortunately, this “need for speed” can... 4 months ago | 58 mins ServiceOps Solves: Automate core processes to improve efficiency Bill Hansey, Product Marketing Director, ServiceNow This session describes how IT Services and IT Operations teams challenges (high costs, inefficiencies, and poor employee experiences) are solved and h... April 4, 2023 4:00pm Zero Trust and DevOps: Strengthening Cybersecurity in Complex Environments Rick Brown, Solutions Engineer at Progress Chef As technology environments continue to become more complex, cybersecurity challenges are also growing exponentially. The Zero Trust approach has becom... April 4, 2023 3:00pm Load more