Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Explore application security tools and testing to strengthen software defenses Pankul Chitrav, Application Release Engineer | TD Bank In today's digital landscape, ensuring the security of software applications has become paramount. With the rise in cyber threats and the potential fo... 3 days ago | 82 mins Don’t Break the Code! Verify Coverage for Legacy Code Updates Brian McGlauflin, Sr. Software Engineer Demo on how to do AI-enhanced unit testing with Parasoft Jtest As a Java software developer, you probably prefer to write new code to create features... 4 days ago | 61 mins Bringing Video Surveillance to the Edge at the Intersection of IT and Security Danny Collins, Product Marketing Manager, Wasabi Technologies; Mike O’Neil, Director of Systems Engineers, Scale Computing The digital transformation in the video surveillance industry is generating a new demand among customers processing data closer to the endpoint, or th... June 22, 2023 6:00pm Session 2: Protect Your Apps and APIs across a Distributed Cloud Richard Bible, F5 Senior Solutions Engineer With cloud architectures, protecting both the application business logic and the underlying infrastructure is paramount. With the F5 Distributed Cloud... 2 weeks ago | 32 mins Building AI-Powered Search Apps on Greenplum with pgvector Ruxue Zeng, Data Solutions Engineer, VMware & Ahmed Rachid Hazourli, Data Solutions Engineer, VMware In the past year, embeddings have gained significant traction as a powerful technique in the fields of Machine Learning and Generative-AI. These embed... June 22, 2023 5:00pm AI Package Hallucination - A New Supply Chain Attack Technique to Watch Bar Lanyado, Vulcan Cyber security researcher | Mike Parkin, Vulcan Cyber engineer The Vulcan Cyber Voyager18 team recently discovered a new attack technique that enables threat actors to spread malicious code packages using generati... June 22, 2023 3:00pm How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 months ago | 28 mins How to Establish Automotive Fuzz Testing? John McShane, Senior Product Manager | Nico Vinzenz, Cybersecurity Expert | Daniel Teuchert, Application Security Engineer Fuzz testing is effective in uncovering vulnerabilities and robustness issues in automotive products. The results are improved development times and l... 3 months ago | 51 mins Dati non strutturati in aumento: proteggili con FB e SafeMode Luca Palese, Senior System Engineer, Pure Storage Per gli informatici che hanno la tecnologia nel sangue, esplorare nuovi hack e casi d'uso può essere divertente. Unisciti a noi per i FlashCrew, il no... 1 day ago | 61 mins Eliminate Blind Spots: 360-Degree Visibility That Protects Your Network With NDR Jake Anthony, Senior Enterprise Sales Engineer at LogRhythm and Tim Simons, Head of Security Services at Proact Protecting your environment against cyberattacks is an increasingly complex challenge for every organisation and security teams can ill-afford to have... 1 day ago | 46 mins Load more