Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... 8 hours ago | 10 mins What the EU Cyber Resilience Act Means for AppSec Michael White, Technical Director and Principal Architect & Per-Olof Persson, Principal Solution Advisor Europe, Synopsys With the cost of cyberattacks predicted to cost $10.5 trillion by 2025, the European Commission is looking to transform the cybersecurity landscape th... 9 hours ago | 34 mins Improve Cloud Security Using ChatGPT & AI Itamar Golan, Head of Data Science — Lior Drihem, Director of Innovation — Jacob Graves, Manager, Sales Engineering The power of artificial intelligence (AI) has recently taken center stage in the media with the availability of new tools like Open AI's ChatGPT. In t... February 9, 2023 6:00pm Take Action: Putting Open Source Risk Management Policies to Work Aditi Sharma, Dell; Patricia Tarro, Dell; Mike Phillips, Dell & Anthony Decicco, GTC Law Group Once you have a grasp on how open source can both benefit and introduce risk to your organization, your next consideration should be learning to manag... 5 days ago | 51 mins Dismantling Ransomware with Unified Endpoint Management Nick Cavalancia, Conversational Geek | Kent Feid, Quest Software In 2022, on average, there was a ransomware attack every 11 seconds (CyberSecurity Ventures). Given the risk environment, it’s important to stay ahead... February 14, 2023 10:00am DAST to the Future Jeff Lawson, Product Management | Patrick Carey, Product Marketing Shifting the Modern Application Security Paradigm The emphasis on securing applications in development has not resulted in the reduction of breaches ... 5 days ago | 57 mins Building Security into DevOps Without Breaking It Steven Zimmerman, Product Marketing - Developer Solutions As development technologies become more fast-paced, modular, and automated, the tools and practices used to secure the software that passes through th... 5 days ago | 16 mins 5 Ways to Establish Zero Trust in the Cloud with Orca Security and AWS Ty Murphy, Director of Product Marketing at Orca Security & Dudi Matot, Security Segment Lead at AWS Establishing a Zero-Trust program is a critical strategy to help security teams govern security across cloud and on-premise environments. As an AWS So... February 16, 2023 7:00pm Security You Can Trust Now? We’ve Got this. Rusty Waldron, VP, Chief Business Security Officer, ADP and Mollie Mantia, Sr. Director- Compliance, ADP In the everchanging landscape of today’s world – security is at the forefront of everyone’s mind. You might ask: Is our data protected? What are our... February 7, 2023 6:00pm Bot Management Masterclass: 5 Key Principles to Win Against Bots David Senecal, VP of Architecture & Research at Arkose Labs Despite the myriad of bot prevention solutions and investments businesses are making to tackle this growing (and evolving) problem, we are far from wi... February 7, 2023 6:00pm Load more