Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am How to Protect Your Digital Business Rafe Pilling, Senior Security Researcher, Counter Threat Unit; Emma Jones, Proactive Incident Response Consultant How to Protect Your Digital Business: 3 Top Success Factors to Securing Your Digital Workforce Watch our webinar to discover the impact digital trans... July 27, 2022 1:00pm Zero Trust Segmentation: The Key to Cyber Resilience Raghu Nandakumara, Head of Industry Solutions at Illumio | John Grady, Senior Analyst at ESG If cyber threats are keeping you up at night, you’re not alone. New research by analyst firm Enterprise Strategy Group found that 76% of surveyed orga... 7 days ago | 40 mins 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... July 14, 2022 9:00am EDR, XDR, MDR: Filtering Out the Alphabet Soup of Cybersecurity Speakers Mikita Hanets, Industry Analyst, Frost & Sullivan Bud Ellis, Product Marketing Senior Advisor, Secureworks What you’ll learn: Outlining the various solutions in the cybersecurity market Today’s top security challenges The differences between Product (XDR) a... July 19, 2022 1:00pm 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... July 21, 2022 9:00am 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... July 28, 2022 9:00am 2021 OWASP Top 10: Server Side Request Forger - Ep10 John Wagnon, Solutions Architect, F5 SSRF flaws occur when a web app fetches a remote resource without validating the user-supplied URL. Attackers can coerce the app to send a request to ... August 4, 2022 9:00am Destroy a Fraudster’s Business Model: ATO Masterclass (APAC) Brett Johnson, Former US Most Wanted Cybercriminal turned Good Guy, Kevin Gosschalk, Founder & CEO at Arkose Labs Technological advancements and information sharing among criminal networks have made hacking into bank accounts an increasingly straightforward task —... June 29, 2022 12:00am Securing Cloud Workloads from Threats and Unwanted Activities Bassam Khan, VP of Product and Technical Marketing - Gigamon Originally aired on an ActualTech Media webcast. Cloud workloads protected by platform tools are not immune to threats, whether the cybercriminal’s i... June 29, 2022 1:00am Load more