Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [The Lost Bots] Episode 6: How to Spot and Stop Bad Actors [EMEA] Jeffrey Gardner, Detection and Response Practice Advisor and Stephen Davis, Lead Sales, Technical Advisor Pen testing is something (we think) we’re all familiar with, allowing offensive security teams to infiltrate their own organizations' environments, te... 1 month ago | 38 mins Forrester Study on the Total Economic Impact of Crowdsourced Pen Tests Jonathan Lipsitz, Amy DeMartine, Forrester Analysts, and Luke Tucker, HackerOne Is it possible to replace the cost of traditional penetration tests with a Hacker-Powered security program? Join our discussion with Forrester to disc... 5 months ago | 43 mins [The Lost Bots] Episode 6: How to Spot and Stop Bad Actors [APAC] Jeffrey Gardner, Detection and Response Practice Advisor and Stephen Davis, Lead Sales, Technical Advisor Pen testing is something most people are familiar with, allowing offensive security teams to infiltrate their own organisations' environments, testing... 2 months ago | 38 mins [The Lost Bots] Episode 6: How to spot and stop bad actors Jeffrey Gardner, Detection and Response Practice Advisor and Stephen Davis, Lead Sales, Technical Advisor Pen testing is something (we think) we’re all familiar with, allowing offensive security teams to infiltrate their own organizations' environments, te... 2 months ago | 38 mins Innovations In Third Party Risk Processes: Application Security Controls Tom Garrubba, Director of TPRM Services, Paul Poh, Managing Partner, Radical Security Join Tom Garrubba and Paul Poh for a lively discussion about innovations that could change the way application developers approach common security pit... 5 months ago | 61 mins Protect Kubernetes Apps from SQL Injection Jenn Gile, Senior Manager of Product Marketing, NGINX You work in IT for a popular local store that sells a variety of goods, from pillows to bicycles. They're about to launch their first online store, bu... 2 months ago | 18 mins AppSec and the OWASP Top 10 2021 Vinod Kannan, Aravind Venkataraman and Chai Bhat The past couple of years have seen major changes in the way applications are developed, deployed—and secured. They should accommodate these changes to... 4 months ago | 43 mins Protect Kubernetes Apps from SQL Injection Jenn Gile, Senior Manager of Product Marketing, NGINX You work in IT for a popular local store that sells a variety of goods, from pillows to bicycles. They're about to launch their first online store, bu... 5 months ago | 18 mins Forrester Study on the Total Economic Impact of Crowdsourced Pen Tests Jonathan Lipsitz, Amy DeMartine, Forrester, Analysts, Luke Tucker, HackerOne Is it possible to replace the cost of traditional penetration tests with a Hacker-Powered security program? Join our discussion with Forrester to disc... 1 year ago | 43 mins Industrial cybersecurity: how to pen test & leverage SIEM across IT/OT Networks Jonathan Poon, Novacoast | Thomas McVey, LogRhythm | Christopher Dickson, Novacoast Join LogRhythm and Novacoast for this webinar, during which we will be discussing how to: - Collect security data from your industrial environment - E... 3 years ago | 48 mins Load more