Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date OWASP Top 10: Insecure Design - Ep 4 John Wagnon, Solutions Architect, F5 Security needs to be inherent to applications. A secure design can still have implementation defects leading to vulnerabilities. An insecure design ca... October 12, 2023 9:00am Strange Bedfellows: Software, Security and the Law Sam Quakenbush, Senior Director, Field Innovation & Strategy at Mend.io The ongoing rise in cyberattacks across the software supply chain and a shifting regulatory landscape are forging an unlikely alliance between CISOs, ... 3 weeks ago | 61 mins Manage Software Risk at Scale with Suggested Fixes for Insecure Code Tim Jarrett, VP Product Management, Veracode & Anna Bacher, CTO, Jaroona Software security flaws are created faster than they are fixed. There is a simple explanation for this: We create software with automation. We fix it ... 2 months ago | 44 mins Manage Software Risk at Scale with Suggested Fixes for Insecure Code Tim Jarrett, VP Product Management, Veracode & Anna Bacher, CTO, Jaroona Software security flaws are created faster than they are fixed. There is a simple explanation for this: We create software with automation. We fix it ... 3 months ago | 44 mins CNC - Identifying secure and unsecured ports and how to secure them senhasegura In Information Technology, the term port refers to an access point for transferring data. However, the software port can have different purposes and m... 4 weeks ago | 14 mins Easily Stop Malware, Before Your Company Becomes Liable (and Broke) Brian Fox and Tara Flynn Condon Governments around the world are making secure software development an organizational imperative. For instance, proposed regulations like the EU Cyber... 4 months ago | 29 mins OWASP Top 10: Insecure design Jonathan Knudsen, Head of Global Research Listed at #4 in the OWASP Top 10 list, insecure design is a new category in the OWASP Top 10 in 2021 and is related to critical design and architectur... 8 months ago | 3 mins VeraTalks: Raising Good Software: Is It Nature or Nurture? Anne Nielsen, Veracode Product Management We know most software is insecure. We also know that organizations are struggling to remediate these flaws in a timely fashion. How did we get to th... 2 years ago | 31 mins Deliver Software to Production Quickly and Securely with VMware Tanzu Haewon Shin, Staff Solution Engineer - VMware Tanzu & CTO Ambassador, Office of the CTO, VMware Securing applications against modern threats requires securing every layer of the stack. This talk examines application security starting from the app... 7 months ago | 57 mins Keynote: Software Security: The Stats and the Acts Chris Eng, Veracode Chief Research Officer Seventy-six percent of applications have at least one security flaw. And half of security findings are still open 6 months after discovery. Those are ... 3 years ago | 31 mins Load more