Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Don’t Shift-Left or Shift-Right: CSPM and CWPP just need to have a conversation Dr. Saumitra Das, CTO and Cofounder, Blue Hexagon Cloud security is full of slogans around doing things a certain way depending on the prism of the vendor or solution strategy. Shift-Left advocates ma... 2 weeks ago | 47 mins How to Stop Mobile Banking Fraud with App Security and Risk-Based Authentication Greg Hancell & Sam Bakken OneSpan As mobile banking use surges worldwide in response to COVID-19 and its associated lock-downs, a corresponding rise in mobile banking fraud continue to... 3 weeks ago | 62 mins How to Stop Mobile Banking Fraud with App Security and Risk-Based Authentication Greg Hancell & Sam Bakken OneSpan As mobile banking use surges worldwide in response to COVID-19 and its associated lock-downs, a corresponding rise in mobile banking fraud continue to... 3 weeks ago | 62 mins API Security Best Practices Adam Fisher – Principal Security Engineer, Salt Security API security has emerged as a top priority for protecting vital data and services. Unfortunately, many organizations are just one vulnerable API away ... June 15, 2022 5:00pm Deterministic Protection: Shifting to the New Normal for Cloud Security David Reilly, former Bank of America CIO and Dave Furneaux, Virsec CEO Cyber-attacks have become increasingly complex where actors exploit systems at the core to obtain control of software, applications, & workloads - byp... 2 months ago | 42 mins Stop the Kill Chain at the First Step: Effective Runtime Protection Dave Furneaux, CEO, Virsec Advanced attacks like SolarWinds and Hafnium are easily bypassing conventional security tools and targeting a blind spot – application runtime. Even o... 1 year ago | 46 mins Memory Protection Demo Virsec Protecting applications during runtime at the memory level has long been considered difficult to impossible. John Chambers, former CEO of Cisco, recen... 1 year ago | 32 mins Supply Chain Protection: Stop Remote Code Execution During Runtime Virsec The SolarWinds supply chain attack was a brutal security failure that relied on perimeter tools, threat hunting and prior knowledge to stop an attack ... 1 year ago | 62 mins Runtime: The New Security Battleground Virsec Advanced attacks like SolarWinds and Hafnium are easily bypassing conventional security tools and targeting a blind spot – application runtime. While ... 1 year ago | 39 mins Webinar em Português: Lições aprendidas com Log4j Paulo Braga, Imperva Senior Sales Engineer Participe dessa sessão virtual com a equipe de especialistas da Imperva para conversar sobre os recentes ataques Log4j. Saiba mais sobre as caracterís... 3 months ago | 62 mins Load more