Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Save Time & Improve Quality on the Fast Path for JUnit Testing Brian McGlauflin, Sr. Software Engineer Many software developers will agree that, although unit testing is extremely valuable to help find and fix issues in code, it’s time intensive and ted... 21 hours ago | 64 mins Three Data Management Principles for Enabling AI Perttu Salli, Business Lead of Data Solutions at Solita In this video, you will get hands-on insights from leading organizations and learn how to: - Identify and fix your architectural bottlenecks - Create... June 30, 2022 5:00pm Ransomware readiness as part of your Business Continuity Plan Ollie Kwan, Head of Tenable.ad, APAC Ransomware readiness has become a very important issue at the Board level due to the increasing frequency of this attack type. How can organizations f... 2 days ago | 30 mins Combating Ransomware 2.0: Beyond Backups Dr. Mike Lloyd, Chief Technology Officer and Bryan Barney, CEO, RedSeal Ransomware isn’t new – we can track it back to attacks using floppy disks in 1989 – and like all attacks, it has evolved over time. As defenders adopt... 2 days ago | 36 mins Why Dumb Data Will Sabotage Your Intelligent Applications Steve Farr, Charlie Chambers & Sanaz Zarkesh Data is your primary asset to create competitive advantage. It is the foundation of the digital transformation revolutionising so many sectors of our ... 2 days ago | 49 mins Shift Left: Find and Fix Cloud Security Risks Earlier in the Development Cycle Keith Mokris, VP of Product Marketing, and Lior Samuni, Director of Engineering, Orca Security Development teams continue to leverage cloud native technologies and deploy applications faster than ever. But, existing security solutions and a plet... 1 week ago | 30 mins [IBM + Instana] IBM Observability by Instana Drew Flores Learn how IBM and Instana came to be. You’ll understand how Instana can make sense of your chaotic cloud-native environments, uncover anomalies in the... 6 days ago | 36 mins Active Directory Masterclass: AD Configuration Strategies for Stronger Security Sander Berkouwer (Microsoft MVP and MCT), Alex McCoy (PreSales Engineer at Netwrix) Active Directory (AD) is leveraged by over 90% of enterprises worldwide as the authentication and authorization hub of their IT infrastructure— but it... July 6, 2022 5:00pm Fuzzing: Crossing The Gap From Anomaly to Action Rod Villasenor, Synopsys Fuzzing is proven to be one of the most effective techniques for identifying security vulnerabilities. But many organizations struggle to capitalize o... July 7, 2022 9:00am What I Wish I Knew About Security When I Started Programming Allon Mureinik, Senior Manager, Synopsys What I Wish I Knew About Security When I Started Programming Have you heard? AppSec is hard. Nothing works, no one knows how to fix it, it’s a nightma... July 14, 2022 9:00am Load more