Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Align Your ITSM and SecOps Strategy for Unstoppable IT Eric, Sr Director of Partnership at Freshworks | Chandrashekhar, CEO at SecPod To deal with the rising number of cyberattacks, ITSM strategy should align with SecOps (Security Operations). With SecOps functions merged within the ... January 31, 2023 2:30pm Making It All Work Jeff Lawson, Product Management | Peter Monahan, Dir., Solutions Architecture | Vishrut Iyengar, Product Marketing A Practical Guide to Operationalizing the Modern AppSec Framework You need to modernize your application security program and you know how you are go... 4 days ago | 59 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 2 weeks ago | 28 mins Orchestrating Secure User Login with Authentication Actions Michal Trojanowski, Product Marketing Engineer at Curity and Gary Archer, Product Marketing Engineer at Curity Identity and access management (IAM) aims to give digital entities the right access to the right resources at the right time. One challenge is to iden... 3 weeks ago | 51 mins Red Teaming Series – EP1 – Talking with industry Experts on Offensive Security Pascal Geenens, Radware | Daniel Smith, Radware | Snir Ben Shimol, Cider Security Simply deploying security solutions isn’t going to cut it. Today’s threat landscape constantly evolves and requires organizations to test and validate... 2 weeks ago | 31 mins Red Teaming Series – EP1 – Talking with industry Experts on Offensive Security Pascal Geenens, Radware | Daniel Smith, Radware | Snir Ben Shimol, Cider Security Simply deploying security solutions isn’t going to cut it. Today’s threat landscape constantly evolves and requires organizations to test and validate... 2 weeks ago | 31 mins Red Teaming Series – EP1 – Talking with industry Experts on Offensive Security Pascal Geenens, Radware | Daniel Smith, Radware | Snir Ben Shimol, Cider Security Simply deploying security solutions isn’t going to cut it. Today’s threat landscape constantly evolves and requires organizations to test and validate... 2 weeks ago | 31 mins 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 3 weeks ago | 61 mins BPI Opportunities - 4Q 2022 Luís Alvarenga and Rui Araújo BPI Opportunities invests in global stocks, focused on large capitalization companies in developed markets, characterized by high and consistent retur... 9 hours ago | 33 mins Restaurer la transparence sur vos processus et votre architecture d’entreprise Vanessa Lacontal, SAP Signavio | Alexander Ettinger, LeanIX Afin de poser les bases d’une transformation réussie, il est important de comprendre d’où l’on part. Or, cela n’est pas toujours aisé lorsque l’on ne ... January 31, 2023 9:00am Load more