Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Open Source Risks with New Technologies: AI, GitHub Copilot, Blockchain & More Mark Radcliffe, DLA Piper, Anthony Decicco, GTC Law Group, Sam Ip, Osler, Hoskin, & Harcourt The evolution of newer technologies, like artificial intelligence, machine learning, GitHub Copilot, blockchain, cryptocurrencies, DeFi, APIs, contain... March 22, 2023 4:00pm Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 5 days ago | 37 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 5 days ago | 38 mins Software Risk is Business Risk Per-Olof Persson, Principal Solution Advisor, Synopsys Software risk is not only a technology problem. It is a business problem. Once you deploy and use software, you own the risk that comes with it. No m... 1 month ago | 34 mins DevSecOps: Implémenter la sécurité dans les chaînes DevOps Laurent Le Bourhis, Ingénieur Avant Vente Travailler en mode DevOps est désormais très répandu, et maintenant le mouvement DevSecOps est en plein essor. Mais l'intégration de la sécurité appli... March 29, 2023 9:00am Takeaways from Recent Software Supply Chain Developments Anthony Decicco, GTC Law Group Modern application development and deployment models make for a software supply chain that’s more complicated than ever before. While managing the ope... 3 weeks ago | 42 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 2 weeks ago | 28 mins Software Construction & Business Risk: Best Practices for Software Due Diligence Declan Burns and Phil Odence, Synopsys The purpose of software due diligence is to identify risks in software. Understanding how software is developed and what kinds of issues can lurk in t... 1 month ago | 60 mins Eliminate Unnecessary IT Risk with 9 Real-World Recommendations Angie Redfern, Director of Enterprise Risk and Issue Management, ServiceNow As IT Risk Managers we are all experiencing about some common challenges: managing vendors, digital transformation creating new risks, keeping up with... March 21, 2023 4:00pm 2023 Cybersecurity Training Trends Simone Petrella, President of N2K Networks and CEO & Founder of CyberVista How are infosec leaders thinking about cybersecurity training in 2023? We surveyed over 100 IT and security leaders across multiple industries to unde... March 21, 2023 3:00pm Load more