Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... July 14, 2022 9:00am 5 Imperatives for Delivering Software With Confidence Arthur Hicken, Chief Evangelist & Matt Klassen, CMO Delivering software fast is good but delivering fast with confidence is better. Leading development groups have figured out five imperatives for impro... 4 months ago | 61 mins Seamless Customer Onboarding: Fact verses Friction Surash Patel, VP at TeleSign EMEA During H1 2021 alone, financial institutions have already been fined over $2 billion. This has been partly due to failures in risk identification and ... 3 days ago | 51 mins AD Attack Paths: How Object-level Permissions Lead to Inadvertent Access Jeff Warren, GM-Products, Stealthbits now part of Netwrix The overwhelming majority of organizations worldwide leverage Active Directory (AD) as their central hub of authentication and authorization. It liter... 4 days ago | 31 mins [EMEA] 15 Min Take: How to Accelerate Risk Identification & Threat Remediation Meaghan Donlon and Jane Man Join Rapid7's Meaghan Donlon, Product Marketing for the Detection & Response practice and Jane Mann Product Management for Vulnerability Management pr... 2 months ago | 14 mins [APAC] 15 Min Take: How to Accelerate Risk Identification & Threat Remediation Meaghan Donlon and Jane Man Join Rapid7's Meaghan Donlon, Product Marketing for the Detection & Response practice and Jane Mann Product Management for Vulnerability Management pr... 2 months ago | 14 mins Bolstering Security in the Era of Remote Work Jack Poller - Senior Analyst, ESG and Ryan Terry, Senior Solutions Product Marketing Manager at Okta IT and security teams across industries are supporting increasingly distributed workforces and a growing number of device options. Meanwhile, identity... July 13, 2022 3:00pm Log4j, Security Risks, and M&A: Identifying Software Risk in Deals Shandra Gemmiti, Synopsys Apache Log4j is a broadly used open source component within the Java community, making its recent zero-day vulnerability a major fire drill for countl... 1 month ago | 41 mins Beyond Device Authentication: Positively ID the Individual Kevin Wiser (Solutions Architect, BIO-key), Alex Apostolov (Customer Success Manager, BIO-key) With employees working from home and on the go, strong authentication becomes even more critical to confidently identify end-users when they are loggi... 2 weeks ago | 50 mins [EMEA] 10 Min Take: How to Accelerate Risk Identification & Threat Remediation Meaghan Donlon and Jane Man Join Rapid7's Meaghan Donlon, Product Marketing for the Detection & Response practice and Jane Mann Product Management for Vulnerability Management pr... 4 months ago | 14 mins Load more