Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyber fraud in 2022: current threats and prevention techniques Ekaterina Danilova, Business Development Manager, Kaspersky Fraud Prevention In 2021, while life began to return to normal, fraudsters and cyber-criminals continued to keep their fingers on the pulse, adjusting their schemes to... July 5, 2022 5:00am Is a False Sense of API Security Pervasive in the Enterprise? Christopher M. Steffen | Prakash Sinha Modern applications, composed of functions and services, require developers to rely on APIs to communicate between applications and their components t... 3 days ago | 60 mins 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... July 14, 2022 9:00am 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... 3 weeks ago | 10 mins 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... July 21, 2022 9:00am 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... July 28, 2022 9:00am 2021 OWASP Top 10: Insecure Design - Ep 4 John Wagnon, Solutions Architect, F5 Security needs to be inherent to applications. A secure design can still have implementation defects leading to vulnerabilities. An insecure design ca... 4 weeks ago | 8 mins Recommendation systems: From A/B testing to deep learning Uri Goren, Head of Recommendation, Argmax Recommendation systems got a lot of focus in recent times due to the increase in online shopping. Recommendation always goes hand in hand with measure... 2 weeks ago | 31 mins Short Stories for Media & Entertainment Success Alex Simmons, Dan Stephens, Erin Bankaitis, Manuel Guzman Over the last 10 years, online streaming, on-the-go platforms, and subscription models have exploded. Competition has never been greater, with each co... 2 days ago | 55 mins Load more