Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Implement Vulnerability Management with Runecast Steve Salisbury (Product Marketing Specialist) & Steve Bettison (Technical Sales Engineer) As the complexity of software and therefore their vulnerabilities increase, so does the need for better vulnerability management. Regular automated sc... August 25, 2022 9:00am 2021 OWASP Top 10: Broken Access Control - Ep 1 John Wagnon, Solutions Architect, F5 2021 OWASP Top 10: Broken Access Control - 01 94% of tested apps showed some form of broken access control. Failures can result in unauthorized disc... September 14, 2022 9:00am 2021 OWASP Top 10: Injection - Ep 3 John Wagnon, Solutions Architect, F5 Injection is a broad class of attack vectors where untrusted input alters app program execution. This can lead to data theft, loss of data integrity, ... September 28, 2022 9:00am Megatrends series - Cybersecurity: This megatrend is not optional Christopher Gannatti, Head of Research Europe, WisdomTree Many megatrends represent a choice. Should a company use cloud-based software, for example. We may have a view, but we have to recognise that it’s not... 5 months ago | 52 mins Identity Analytics As a Cornerstone for Implementing Successful Zero Trust Sanjay Raja, VP Product Marketing and Solutions Understanding current access privileges, controls, and potential security gaps is critical to designing the right policies around least-privileged acc... August 18, 2022 6:00pm The CIO-CISO Balancing Act in the Cloud Guy Raz, Principal Systems Engineer at ExtraHop and Melinda Marks, Senior Cloud Security Research Analyst at ESG Digital transformation and cloud migration projects are fundamental to enterprise growth. While both the Offices of the CIO and CISO play a crucial ro... August 18, 2022 5:00pm A Guide to Enabling More Business Users to Leverage Trusted Data Mike Leone - Senior Analyst at ESG, John Wills - Field CTO, Alation and Myles Suer - Director, Solutions Marketing, Alation Harnessing quality data and putting it to use is of the utmost importance for businesses going forward. A well-functioning data analytics process enab... 1 hour ago | 40 mins Why Can't We Make Secure Software? Tanya Janca, Founder, We Hack Purple A lot is expected of software developers these days; they are expected to be experts in everything despite very little training. Throw in the IT secur... August 18, 2022 5:00pm Smarter Expense Management Kara Bernard, Managing Director, Lyndon Group When it comes to where and how people are working, 2020 and 2021 have been transformational years. From the sudden transition to remote work to today’... 1 day ago | 62 mins How to Automate Firewall Policy Changes Dan Sullivan, Principle Solutions Engineer at Itential Many network and security teams have found themselves struggling to keep up with the ever-growing daily backlog of changes requested by the applicatio... 1 day ago | 30 mins Load more