Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Future of Attacker Automation and AI David Warburton, Director at F5 Labs, the Threat Research Division of F5 and Bryan Glick, Editor in Chief at ComputerWeekly Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and ... 2 days ago | 45 mins The Real Cost of Bad Software Quality in the U.S. in 2022 Herb Krasner, CISQ Advisory Board Member and Mike McGuire, Solutions Manager at Synopsys Tune in to learn more about “The Cost of Poor Software Quality in the US: A 2022 Report” that was recently published by CISQ. The 2020 edition of th... 6 months ago | 51 mins How To Fix 5 Critical & Common Cloud Security Risks in 2023 Bar Kaduri, Cloud Threat Research Team Lead—Jacob Graves, Sales Engineering Mngr—Jason Silberman, Sr. Product Marketing Mngr In this webinar, we will present new research from Orca Security that highlights the top 5 cloud security risks of 2023, from insecure secrets and vul... June 15, 2023 6:00pm Defying the Hackers: Security Insights with Kevin Mitnick Kevin Mitnick, The World's Most Famous Hacker & Kevin Cole, Director of Technical Product Marketing at Zerto Join Zerto and Kevin Mitnick, world renowned hacker and cybersecurity expert, as he shares more about the changing threat landscape. Learn how to bols... June 13, 2023 6:00pm Security and the DevSecOps Platform: Approaches, Methods, and Tools Arlen Baker, Principal Security Architect, Wind River Only 8% of organizations have secured at least 75% of their cloud-native apps using DevSecOps (Enterprise Strategy Group). DevOps is enabling faster... 3 days ago | 41 mins Gain visibility and enforce security policies for assets across public clouds Aviel Tzarfaty, Product Manager at CyCognito The digital transformation from on-premise environments to public cloud environments has made managing all assets exposed to the internet very challen... June 15, 2023 3:00pm Open-Source Malware: An Evolving Landscape & Technical Analysis Hido Cohen, Cyber Security Researcher and Michael Gorelik, CTO Morphisec Threat Labs researchers have seen an uptick in attack campaigns using open-source malware. As software development open-source communities g... June 13, 2023 3:00pm The Dark Side of the Cloud: CNAPP Strategies that Shine John Lewington, Industry Specialist & Shanan Winters, Senior Product Marketing Manager The cloud is a powerhouse for rapid innovation. But with great power comes great responsibility. Growing cloud footprints introduce sprawling attack s... June 21, 2023 3:00pm Navigating the Compliance Landscape in a Zero Trust World Fadi Saba, Keith Hillis, Ariel Zeitlin A compliance assessment is one of the most time-consuming tasks security teams are charged with across all industries. Gaining visibility into the net... June 15, 2023 3:00pm School of Phish: Importance of Three Categories of Protections - Process Ken Dang, Sr. PMM; Immanuel Chavoya, PSIRT; Sorosh Faqiri, PM; John Phil, Sr. SA; JT Fanning, Sr. TAM KNOW WHAT TO DO WHEN A SUSPECTED EMAIL THREAT IS DISCOVERED. Part two of this series delves into the importance of the organization’s operational pro... June 15, 2023 6:00pm Load more