Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 2 days ago | 61 mins The Future of Attacker Automation and AI David Warburton, Director at F5 Labs, the Threat Research Division of F5 and Bryan Glick, Editor in Chief at ComputerWeekly Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and ... 2 days ago | 45 mins How to Integrate Static Analysis Into Your CI/CD Azure Pipeline for Embedded Ricardo Camacho - Director Regulatory Software Safety & Security Compliance A collaborative culture within organizations has been proven to streamline the product development process. It places value on effective communication... 1 month ago | 36 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 3 months ago | 38 mins Eliminate Blind Spots: 360-Degree Visibility That Protects Your Network With NDR Jake Anthony, Senior Enterprise Sales Engineer at LogRhythm and Tim Simons, Head of Security Services at Proact Protecting your environment against cyberattacks is an increasingly complex challenge for every organisation and security teams can ill-afford to have... 1 day ago | 46 mins Operationalizing Zero Trust with Deep Observability John Quezada, Sr. Solutions Engineer, Public Sector - Gigamon Gigamon Deep Observability ensures your tools and Zero Trust policy engine have access to all network-based communications in your organization. For a... 2 days ago | 54 mins Multicloud Cybersecurity Trend: Supercharged Strategies for Supercharged Threats Tony Lauro, Director, Security, Technology & Strategy, Akamai The cloud is the optimal environment for most workloads, with many organizations using multiple cloud providers to reduce risk, maximize agility, and ... 2 days ago | 28 mins The growing threat to APIs — and how Cloudflare API Gateway can help Jamal Boutkabout, Partner Solutions Engineer, Cloudflare | Welly Tandiono, Partner Solutions Engineer, Cloudflare Business is driven by APIs. In fact more than half the traffic we see on our network is API-related. What’s more, we now block a greater percentage of... June 12, 2023 4:00am Identity-First Security, the Foundation for Zero Trust Marc Airo Farulla, ANZ Regional Sales Director, AppViewX & Nick Lovell, Global Sales Director, Oper8 Global Machine identities greatly outnumber human identities but they continue to be a blind spot for most identity and access management programs. In this w... 2 days ago | 27 mins Improving Security and Ransomware Preparedness in Healthcare Environments Martyn Crew, Sr. Director of Solutions and Partner Marketing, and Michael Pinto, Regional Sales Director, Healthcare Special Join Martyn Crew and Michael Pinto from Gigamon in this exciting conversation all about the specific considerations, risks and opportunities for heal... 3 days ago | 29 mins Load more