Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Why Threat Modeling Is Critical for Enterprise Cyber Defense Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 3 months ago | 61 mins The Evolution of Pen Testing Thomas Richards, Principal Consultant Network and Red Team Practice Director Innovate or perish is the only choice available to tech companies. Innovation ensures a constant state of change—new programming languages, systems, a... 1 month ago | 29 mins Building Security into DevOps Without Breaking It Steven Zimmerman, Product Marketing - Developer Solutions As development technologies become more fast-paced, modular, and automated, the tools and practices used to secure the software that passes through th... 3 months ago | 16 mins Black Box Scanning Is Great, but Is It Enough? Gabe Nguyen, Senior Sales Engineer Dynamic application security testing can uncover many vulnerabilities, but there are gaps that only a business logic assessment (BLA) can safely unpac... 2 months ago | 29 mins Too Many Security Tools. Too Many Results. How to Focus on What Matters Most? Lucas von Stockhausen, Senior Director of Security Engineering, Synopsys Most teams are automating at least part of the application security testing within CI/DevOps pipelines. But as they begin to automate test they may fi... 3 months ago | 21 mins 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 4 months ago | 61 mins Streamlining Endpoint Management for Enhanced Efficiency with BigFix Workspace Anouk Shlamovitz, Technical Advisor Bigfix Join us for this technical webinar to discover how BigFix Workspace can revolutionize your endpoint management processes fueled by AI, providing you w... October 4, 2023 3:00pm Increasing Cloud Visibility to Mitigate and Respond to Attacks Adam Gavish, CEO at DoControl and Jacob Schofield, Manager of Consulting Services at Legato Security Security teams of all sizes struggle to detect, triage, and respond to threats quickly and efficiently at scale. Simply put, visibility is a critical ... 18 hours ago | 31 mins Building a Proactive Strategy to Exposure Management Ryan Roobian, Principal Architect; Alexa Rzasa, Product Marketing Manager Join Ryan Roobian and Alexa Rzasa for a live discussion on how to better understand your unique threat landscape and attack surface to proactively ide... 19 hours ago | 60 mins Using Asset Context and Vulnerability Criticality to Prioritize Endpoint Risk Fiona Ing, CrowdStrike | Tal Morgenstern, Vulcan Cyber | Nathan Shock, Kudelski Security Endpoint risk in and of itself is manageable, especially for CrowdStrike customers. But how does the complexity, interconnectedness and scale of moder... 6 days ago | 33 mins Load more