Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 2 days ago | 61 mins Simplifying Cloud Security - A SANS Review of Forcepoint ONE Matt Bromiley, SANS Analyst | Mike Schuricht, VP, Products, Forcepoint Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security... 3 months ago | 60 mins Taking Zero Trust to 100%: Best Practices to Support your Journey Alexandra Willsher, Forcepoint | John Leonard, Computing | Anne Cockshott, The Channel Company EMEA Zero Trust is widely regarded as the best approach for protecting organizations, but implementing it is a journey rather than a one-off purchase. The... 3 months ago | 38 mins The 2022 Open Source Year in Review Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general co... 5 months ago | 67 mins How to leverage full cloud adoption in payments Darren Busby (MYHSM Global Head Sales) | Sudhir Kalidindi (AWS Principal Solutions Architect) | Suresh Vaghjiani (CLOWD9 CEO) Digital transformation and the global growth of electronic payments forges ahead with unprecedented momentum, but this growth potential does not guara... 3 months ago | 58 mins How Risk Signals Can Enhance ID Verification in the Hospitality Industry Casey Nelson (Jumio), Tim French (Jumio), Chris Howell (Jumio), Sathish Durairaj (Jumio) Join us on Thursday, May 4 at 2pm ET as we share the latest updates to Jumio’s KYX orchestration platform. We will review frictionless risk signals th... 1 month ago | 50 mins Accelerate CI/CD Feedback for Feature Branch Development Ruben Wildeboer, Solution Architect Managing code branches for new features is handled most effectively when properly integrated into your CI/CD pipeline and processes. High performing t... 2 months ago | 43 mins Accelerate Secure Software Development with Veracode Fix Veracode Developers spend too much time manually fixing security issues and often create new flaws faster than they can fix old ones. Veracode Fix changes thi... 2 days ago | 4 mins Using a Framework to Guide an IT Security Review Justin T. Noble, CIA, MBC, Director of Internal Audit, Office of Audit, Risk, and Compliance, Virginia Tech IT security doesn't have to be scary. You can do many controls-based reviews without deep expertise. In this session, you will come along on a real-li... 3 days ago | 62 mins Cyber Notes Cast - The Main Types of Cyberattacks in Cloud Environments senhasegura Cloud services facilitate the routine of companies and optimize their productivity, especially in the context of remote work. However, they can presen... 23 hours ago | 6 mins Load more