Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Building Security into DevOps Without Breaking It Steven Zimmerman, Product Marketing - Developer Solutions As development technologies become more fast-paced, modular, and automated, the tools and practices used to secure the software that passes through th... 2 days ago | 16 mins What the EU Cyber Resilience Act Means for AppSec Michael White, Technical Director and Principal Architect & Per-Olof Persson, Principal Solution Advisor Europe, Synopsys With the cost of cyberattacks predicted to cost $10.5 trillion by 2025, the European Commission is looking to transform the cybersecurity landscape th... February 7, 2023 9:00am Automagic API Security Testing Steve Chappell, SW Manager & API Security Evangelist Most API Security tools/platforms are built for the Security teams that are told “here’s an API service already running – go secure it”. Thus, they ta... 1 month ago | 30 mins 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 3 weeks ago | 61 mins Case Study - The ROI of Managed Risk-Based Vulnerability Management Josh Allen, PurpleSec CPO | Jason Firch, PurpleSec CEO Watch this case study webinar by PurpleSec on the ROI of managed risk-based vulnerability management (RBVM) for a leading travel services provider. He... 2 days ago | 29 mins The Future Is Agentless: Cloud Security for Modern Environments Sagy Kratu, Director of Enablement and Evangelism and Jason Silberman, Senior Product Marketing Manager Traditional agent-based cloud security tools have blind spots. They either can’t see all of your cloud assets or can’t analyze them with proper risk c... 2 days ago | 36 mins Security You Can Trust Now? We’ve Got this. Rusty Waldron, VP, Chief Business Security Officer, ADP and Mollie Mantia, Sr. Director- Compliance, ADP In the everchanging landscape of today’s world – security is at the forefront of everyone’s mind. You might ask: Is our data protected? What are our... February 7, 2023 6:00pm Data Protector Role Based Access Control Marc Fisseler - Presales Consultant, Data Protection Backup as a Service (BaaS) bietet die Möglichkeit, Unternehmensdaten über einen Service Provider zu sichern, der die erforderliche Backup- und Wiederh... February 6, 2023 8:00am Mobile Threat Patterns Across Australia | 2022 Q4 Analysis Pat Shueh | VP of Solution Engineering, Zimperium Mobile is the unsecured dream frontier for malicious actors targeting critical data and IT systems here in Australia. No matter the device, OS or own... February 7, 2023 12:00am The top five requirements for External Attack Surface Management (EASM) Rob Gurzeev, CEO & Co-founder of CyCognito As organizations adapt to the structural changes imposed by digital transformation, they find it nearly impossible to identify, classify, and monitor ... February 9, 2023 6:00pm Load more