Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cure Your SIEM of Alert Fatigue Justin Baryza, Senior Enablement Engineer, Pentera Many SIEM solutions now come with out-of-the-box rules and models to reduce some of the noise from unnecessary or irrelevant data and alerts. Yet orga... 5 days ago | 26 mins The Ethical Hacker Insights Report 2022 Inti de Ceukelaire This webinar gives an in-depth reading of our hacker insights report from 2022, where we demystify ethical hacking and deep dive into researchers’ dri... 2 weeks ago | 44 mins How Human Experts Give you a Security Advantage Alex Rice, CTO, and Chris Evans, CISO and Chief Hacking Officer at HackerOne Achieving actual attack resistance is hard. Security teams are stretched thin, attack surfaces are expanding, and digital threats are increasingly dif... April 5, 2023 5:30pm An introduction to Bug Bounty Programs Stijn Jans The need for modern, proactive security has never been more important. A simple yet proven method to protecting against cyber threats is to invite eth... 4 weeks ago | 57 mins Former hacker proves how multi-layered protection stops cyber-attacks Eric Bassier, Senior Director, Product Marketing; Jamie Woodruff, Ethical Hacker Join ethical hacker Jamie Woodruff and Quantum to learn about the evolution of cybersecurity, and some steps that IT organizations should be taking to... 3 months ago | 41 mins Ask a Hacker in 2023 Joel Noguera, Douglas Day, Sean Melia, Jon Colston, and Chris Evans In this session, some of world’s top ethical hackers share everything you've ever wanted to know. Hear about their most exciting find, learn about the... 1 month ago | 30 mins Why Isn’t Anyone Paying Bounties for Zero Days? Chris Evans, CISO, HackerOne, Maddie Stone, Ethical Hacker and Rotem Bar, Ethical Hacker What’s your definition of a zero day? Exactly what a zero day is, and how one should be tackled when it comes to bug bounty, has been a contentious is... 3 months ago | 59 mins API Hacking Toolbox Dr. Katie Paxton-Fear | Ethical Hacker, Researcher & Lecturer @ Manchester Metropolitan University API Security starts with understanding your API inventory and the business risk of your APIs. In this educational session with Dr. Katie Paxton-Fear,... 7 months ago | 27 mins The Hacking Games - Operation System Vulnerabilities Virtual Meetup Gidi Farkash, Pipl | Omer Yaron, Enso Security | Uriel Kosayev, MalwareAnalysis.co | Matan Liber, Pentera Our technology, work processes, and activities all are depend based on Operation Systems to be safe and secure. Join us virtually for "The Hacking Ga... 4 months ago | 104 mins API Hacking Stories - Cautionary Tales Dr. Katie Paxton-Fear | Ethical Hacker, Researcher & Lecturer @ Manchester Metropolitan University Learn from real-world API attacks and vulnerabilities from API Security researcher, Dr. Katie Paxton-Fear. In this discussion, Katie shares a few ca... 6 months ago | 22 mins Load more