Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date DEMO - See Workload Protection, WAF and API Security in Action Ivan Melia, Senior Manager Product Marketing, Prisma Cloud by Palo Alto Networks Join us for a 30-minute demo session to see how to get complete security across your application lifecycle with Cloud Workload Protection by Prisma Cl... March 22, 2023 9:00am How to Implement Threat Monitoring for Application Security Mike Woodard, VP of Product Management for Application Security & Daniel Shugrue, Senior Product Marketing Manager Digital.ai You know protecting your apps is critical. How can you take it to the next level? Hear straight from our security experts! Join us for an interactive ... March 23, 2023 4:00pm An introduction to Cisco Secure Application Gregg Ostrowski, Kanav Khanna Discover how Cisco Secure Application provides a modern solution that protects applications at runtime. Get a detailed view of our application securit... 1 week ago | 32 mins 6 Ways API Security Makes Your WAF Stronger Yariv Shivek, VP of Product Join us in discussing the benefits of an integrated, proactive runtime API security strategy. After discussing the API threat landscape and existing s... 1 month ago | 57 mins How AI-Powered IOAs and Behavioral ML Detect Advanced Threats at Runtime [NAM] Joel Spurlock (Sr. Director, Malware Research), Joe Faulhaber (Principal Engineer, CrowdStrike) Many organizations today use machine learning (ML) for malware classification and static file analysis. While this can be useful for detecting and res... 2 months ago | 17 mins API Security: Preventing Vulnerabilities and Attacks Jiri De Jagere, Software AG & Sunil Dutt, Salt Security How vulnerable are your organization’s APIs? We’ve all begun to witness the tremendous business value potential that APIs bring, and how they can open... 3 months ago | 32 mins Cloud Native Attacks: Why Runtime Protection is NOT Optional Crystal Poenisch, Senior Product Marketing Manager, Aqua Log4j, fileless execution, crypto-mining, reverse shells –attackers find new ways to infiltrate and exploit your cloud native workloads every day. Whe... 9 months ago | 13 mins Aqua Cloud Native Security: The Path to Runtime Security Iheanyi Njeze, Solutions Architect Runtime exploitation is a risky business. Malicious actors have developed sophisticated techniques to evade static scans by hiding malware in images a... 7 months ago | 34 mins Detecting Advanced Attacks (e.g. Log4J) with Runtime App Observability/Security Chetan Gopal, PhD, Chief Customer Officer This presentation and the live demo will outline modern and accurate methods of detecting the most sophisticated attacks, such as Log4J, ZeroDay, etc.... 8 months ago | 34 mins Uncover and Deter Sophisticated Attacks with Security Observability Keshav Kamble, Co-Founder & CTO, Joseph Feiman - Chief Strategy Officer Discover applications, microservices and API across your application ecosystem. Detect and monitor runtime processes, database calls and API calls. Id... 6 months ago | 47 mins Load more