Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Security Master Chef: A Visibility and Response Recipe for Any Cloud Environment Joshua Cowling - Consulting Sales Engineer at Splunk Angelo Brancato - Executive Cyber Security Advisor at Splunk Organizations are adopting cloud services at a rapid speed, and security incidents are spanning across on-premises, multi-cloud platforms, and many un... July 5, 2022 12:00pm The Big SaaS Disconnect Christophe Bertrand, ESG and Drew Russell, Rubrik Microsoft 365 has become a Tier 1 application, mission critical to business operations – and targeted by ransomware attackers. While Microsoft provide... July 5, 2022 10:00am MITRE ATT&CK Framework: Seeing Through the Eyes of Your Attacker Davide Veneziano Senior SE, Antonio Forzieri Cybersecurity Specialist & Matthias Maier EMEA Director of Product Marketing Start thinking like an attacker and learn how to make more effective decisions to prevent costly attacks – before your business is interrupted. It’s ... July 7, 2022 12:00pm Fuzzing: Crossing The Gap From Anomaly to Action Rod Villasenor, Synopsys Fuzzing is proven to be one of the most effective techniques for identifying security vulnerabilities. But many organizations struggle to capitalize o... July 7, 2022 9:00am Is a False Sense of API Security Pervasive in the Enterprise? Christopher M. Steffen | Prakash Sinha Modern applications, composed of functions and services, require developers to rely on APIs to communicate between applications and their components t... 5 days ago | 60 mins [EMEA] Cybersecurity Series: Hackers 're Gonna Hack - Pt 2/3 Jason Hart Foundational Components to Enable a Cyber Target Operating Model In the second webinar of the ‘Cybersecurity Series’, Jason Hart, Chief Technology Of... 4 days ago | 44 mins 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am How to maintain security in a hybrid work environment Thomas Wingfield, Product Marketing Manager & Molita Sorisho, Product Marketing Mngr & Sanjay Khanna, Product Manager @ Webex Security is paramount today. With people now working from everywhere, your risk surface has expanded. Even if your databases and networks are protecte... 4 days ago | 30 mins 2022 Open Source Insights and Trends Tim Mackey, Principal Security Strategist, Synopsys CyRC (Cybersecurity Research Center) Businesses of all sizes are utilizing the power of open source software. But using open source requires maintenance to avoid security, quality, and li... July 5, 2022 3:00am Migrating from Citrix ADC to a Modern, Cloud-Ready Load Balancer Neptuno Moretto, Field Engineering, VMware; Lei Yang, Product Marketing, VMware Citrix’s acquisition by private equity and uncertainty around the products makes it a good time to explore alternatives to Citrix ADC (previously know... July 5, 2022 1:00am Load more