Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Improve attack surface visibility while reducing false positives Meir Asiskovich, VP of Product, CyCognito As enterprises scale, they can easily expect to encounter many supposed security issues creating an unwieldy level of noise. These alerts can affect a... 3 months ago | 45 mins SBOMs in 2023: Trends, Tools, and Capabilities Cortez Frazier, Senior Product Manager, FOSSA | Gauthami Polasani, Senior Product Marketing Manager, FOSSA The software bill of materials (SBOM) landscape continues to evolve, with new tooling, standards, and use cases emerging each year. For 2023, we expec... 4 months ago | 45 mins The Cyber Risk Landscape: Vulnerability Management and Threat Intelligence Brian Spring Security Product Specialist & Guy Newell Regional Manager APAC at ServiceNow The Cyber Risk Landscape: Vulnerability Management and Threat Intelligence With organizations embracing a remote workforce, the attack surface has gr... 7 months ago | 50 mins Carry an Umbrella and It Won’t Rain – Patching to Protect against the Bad Things Rob Ayoub, IDC Research Director Organizations struggle to prioritize and implement the vast number of patches being introduced by software vendors. Testing and implementing takes tim... 6 years ago | 50 mins A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction Ed Bellis, CTO, Co-Founder, Michael Roytman, Chief Data Scientist Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vuln... 5 years ago | 41 mins Data-Driven Prioritization:The Role of AI in Vulnerability and Threat Management Dr. Srinivas Mukkamala, Co-founder and CEO, RiskSense The conventional approach to vulnerability and threat management is rapidly changing to a data-driven strategy in which remediation efforts are target... 5 years ago | 48 mins The OWASP Top 10 2017 - Let's Cut to The Chase Kevin Poniatowski and Mark Burnett What Do You REALLY Need to Know About the New OWASP Top Ten? The OWASP Top Ten is the de-facto web application security standard because it reflects ... 5 years ago | 60 mins Signal in the Noise: Vulnerability Prioritization with Skybox Ronit Markovitz, Product Manager, Skybox Security Register for the webinar to learn how Skybox® Security is simplifying vulnerability management to give you quick insight and help you focus on your mo... 4 years ago | 31 mins The Cyber Risk Landscape: Vulnerability Management and Threat Intelligence Brian Spring Security Product Specialist & Guy Newell Regional Manager APAC at ServiceNow The Cyber Risk Landscape: Vulnerability Management and Threat Intelligence With organizations embracing a remote workforce, the attack surface has gr... 2 years ago | 50 mins Vuln Intelligence Report (April 2021): Findings & Recommendations for Defenders Kevin Flynn, Senior Product Marketing Manager, Tenable To help you refine and improve your vulnerability management efforts, Tenable Research has compiled its annual Vulnerability Intelligence Report. Chec... 2 years ago | 42 mins