Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date What the EU Cyber Resilience Act Means for AppSec Michael White, Technical Director and Principal Architect & Per-Olof Persson, Principal Solution Advisor Europe, Synopsys With the cost of cyberattacks predicted to cost $10.5 trillion by 2025, the European Commission is looking to transform the cybersecurity landscape th... April 5, 2023 9:00am 5 Considerations for a Smooth Replacement of NetScaler Yaron Azerual Citrix recently announced that they’ll soon turn their focus away from you and most customers anddevote all of their resources to their top 1600 custo... 3 days ago | 32 mins 5 Considerations for a Smooth Replacement of NetScaler Yaron Azerual Citrix recently announced that they’ll soon turn their focus away from you and most customers anddevote all of their resources to their top 1600 custo... 3 days ago | 32 mins Building Security into DevOps Without Breaking It Steven Zimmerman, Product Marketing - Developer Solutions As development technologies become more fast-paced, modular, and automated, the tools and practices used to secure the software that passes through th... 3 days ago | 16 mins AppSec vs. NetSec Jonathan Knudsen, Head of Global Research Software security is a large and complicated topic, with a bevy of acronyms and inconsistently applied terminology. In this webinar, Jonathan Knudsen... 2 weeks ago | 28 mins The 2023 Guide to Open Source Mike McGuire, Senior Software Solutions Manager, Synopsys and Phil Odence, GM Black Duck Audit, Synopsys Open source software continues to prove its staying power. It serves as the foundation for the modern applications that we depend on to run. Along w... April 27, 2023 9:00am How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 weeks ago | 28 mins How to Enhance Application Security and Quality with Fuzz Testing John McShane, Product Management | Andy Pan, Product Marketing Modern organizations rely on software to run their business, power their fleets, and manage critical communications infrastructure. Learn how to use ... 2 months ago | 43 mins People & Processes: The Yin and the Yang of Software Security Ed Adams, CEO, Security Innovation While traditional assessment techniques like pen testing and scanning are effective at catching issues before software is deployed, they are simply no... 3 days ago | 32 mins People & Processes: The Yin and the Yang of Software Security Ed Adams, CEO, Security Innovation While traditional assessment techniques like pen testing and scanning are effective at catching issues before software is deployed, they are simply no... April 6, 2023 7:30am Load more