Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [EMEA] Cybersecurity Series: Hackers 're Gonna Hack - Pt 2/3 Jason Hart Foundational Components to Enable a Cyber Target Operating Model In the second webinar of the ‘Cybersecurity Series’, Jason Hart, Chief Technology Of... June 30, 2022 11:00am 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... 2 weeks ago | 10 mins 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... July 14, 2022 9:00am 2021 OWASP Top 10: Insecure Design - Ep 4 John Wagnon, Solutions Architect, F5 Security needs to be inherent to applications. A secure design can still have implementation defects leading to vulnerabilities. An insecure design ca... 3 weeks ago | 8 mins 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... July 21, 2022 9:00am How vaccine producer Novoavax used a CDP to take personalised experiences global Alex Dal Canto, Director of Product Marketing, Acquia & Joe Hansen, Senior Director of Digital & Social Media, Novavax Novavax committed to delivering 1.1 billion doses of its Covid vaccine to COVAX, a worldwide initiative aimed at equitable access to Covid-19 vaccines... 4 weeks ago | 46 mins 2021 OWASP Top 10: Injection - Ep 3 John Wagnon, Solutions Architect, F5 Injection is a broad class of attack vectors where untrusted input alters app program execution. This can lead to data theft, loss of data integrity, ... 4 weeks ago | 12 mins We need to talk about biodiversity: Nature in a Haystack UNEP FI, Finance for Biodiversity Foundation, EU Finance@Biodiversity Community Data and analytics will play a fundamental role in helping companies and financial institutions to identify, manage and report on nature-related risks... June 30, 2022 12:00pm Subscription Foundations | CPQ Best Practices Kyle Tierney, Senior Solution Consultant Subscription-based products and services are becoming more prevalent in today’s business environment, however, they are resulting in more complicated ... June 30, 2022 3:00pm Load more