Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... 2 days ago | 10 mins 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... February 14, 2023 10:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... February 21, 2023 10:00am 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... February 28, 2023 10:00am 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep 9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... March 7, 2023 10:00am 2021 OWASP Top 10: Server Side Request Forger - Ep10 John Wagnon, Solutions Architect, F5 SSRF flaws occur when a web app fetches a remote resource without validating the user-supplied URL. Attackers can coerce the app to send a request to ... March 14, 2023 10:00am What the Future of Your Governance Strategy Looks Like Brett Thompson, Sales Engineer, and Visare Smakiqi, Sales Engineer With hybrid work as the new normal and the increase in cyberattacks, organizations rush to develop the right governance strategy. Mitigating data chao... 3 days ago | 38 mins Mitigating the Risk of Microsoft 365 Attacks Nick Cavalancia, Max Linscott With over 350 million users of Microsoft 365 that have access to applications and data of interest to cybercriminals, it makes sense that Microsoft’s ... 2 weeks ago | 61 mins EP 198: Risk Mitigation Tops Concerns in Global Asset Owner Survey Sylvain Chateau, Global Head of Sustainable Investment Product Management at LSEG In 2022 the top reason for implementing sustainable investment among institutional investors continued to be mitigating long-term investment risk. A m... 2 weeks ago | 21 mins Recovery from a ransomware attack: How to prepare and plan to minimize risk Allan Cytryn, Principal | Risk Masters International Ransomware is an omnipresent threat to every business. A comprehensive defense and recovery plan is an essential requirement for managing and mitigati... 3 weeks ago | 46 mins Load more