Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Explore application security tools and testing to strengthen software defenses Pankul Chitrav, Application Release Engineer | TD Bank In today's digital landscape, ensuring the security of software applications has become paramount. With the rise in cyber threats and the potential fo... June 7, 2023 5:00pm Who is ReversingLabs? Matt Rose, Field CISO, ReversingLabs In this episode, Matt answers a simple yet important question: Who is ReversingLabs? Matt does this by recalling the company’s history, dating back to... 5 days ago | 6 mins How to Keep Sensitive Data Safe and Compliant Nick Hogg, Director of Technical Training at Fortra Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay... 4 days ago | 49 mins Prioritizing SSE to Protect the Modern Digital Business John Grady - Senior Analyst, Enterprise Strategy Group & Doug Browne, Director for Cloud Security & SSE, APJC - Cisco Systems Current IT environments and the reality of modern business practices have left organizations with no choice but to consider new security models. The n... June 8, 2023 5:00am Transforming Cybersecurity From the Power of AI Laura Harder Join us for an eye-opening presentation on the dynamic intersection of Artificial Intelligence (AI) and Cybersecurity. Discover how AI is revolutioniz... 4 days ago | 62 mins Open-Source Malware: An Evolving Landscape & Technical Analysis Hido Cohen, Cyber Security Researcher and Michael Gorelik, CTO Morphisec Threat Labs researchers have seen an uptick in attack campaigns using open-source malware. As software development open-source communities g... June 13, 2023 3:00pm Fraud prevention with open-source intelligence (OSINT) Kevin Libby, Lead Intelligence Solution Architect at Silobreaker Not all fraud is cybercrime, but many cybercrimes involve fraudulent activities. While fraud and cybercrime are related concepts, they are not identi... 2 weeks ago | 44 mins FIM and System Hardening: Detect and Prevent Cyberthreats in Windows Dirk Schrader, VP of Security Research at Netwrix Whether you use your Windows as your server OS for your AD, DC, SQL or file server or as the go-to operating system for your end-users; each applicati... June 14, 2023 5:00pm Cyber Security for Local Government - Protecting Citizen Data & Public Services Mark Ostrowski & Glen Deskin - Head of Engineering | Hosted by Grant Asplund, Chief Evangelist @ Check Point Prevent cyberattacks with consolidated threat prevention across networks, devices, users & access Local governments are one of the main targets for ... 6 days ago | 47 mins Mark of the Web (MOTW) - Challenges, Bypass Methods, and Solutions Arnold Osipov, Malware Researcher and Michael Gorelik, CTO Microsoft identifies Office documents originating from an email attachment or the internet with a Mark of the Web (MOTW). Used by other applications s... 2 weeks ago | 29 mins Load more