Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Rethinking GRC for Modern Software Development Phillip Ivancic and Michael McGrath Many enterprises have split their security functions between first-line defences, where AppSec tooling and penetration testing traditionally fits, and... 1 day ago | 31 mins How to Implement Vulnerability Management with Runecast Steve Salisbury & Steve Bettison As the complexity of software and therefore their vulnerabilities increase, so does the need for better vulnerability management. Regular automated sc... August 25, 2022 9:00am How to Perform Effective Web Application Security Assessments Leanne Shapton - Portswigger, Joel Noguera - Hacker & Pentester, Cindy Ho - HackerOne Security reviews and assessments can take a lot of effort and still not provide the results you are looking for, especially in the face of ever-expand... August 23, 2022 4:00pm A Demo of Vulcan Cyber Risk and Vulnerability Management Tony Taylor, Vulcan Cyber solutions architect Digital businesses are living in a constant state of uncomfortable vulnerability. It’s time for change. The Vulcan Cyber risk and vulnerability manage... August 25, 2022 4:30pm An Overview and Demo of Vulcan Cyber Risk and Vulnerability Management Tony Taylor, Vulcan Cyber solutions architect Digital businesses are living in a constant state of uncomfortable vulnerability. It’s time for change. The Vulcan Cyber risk and vulnerability manage... 3 weeks ago | 43 mins Closing Security Gaps Across the Cloud and Application Attack Surface Spencer Chin NA, Sales Engineer and John Oltsik, Sr Principal Analyst & ESG Fellow Between rapid cloud adoption and accelerated software development life cycles, organizations need a new security approach across their transforming at... 3 months ago | 50 mins Aqua Cloud Native Security JumpStart: Container Image Scanning Iheanyi Njeze, Solutions Architect Full cloud native security requires more than application security testing and network monitoring. It requires a concerted approach to vulnerability m... 3 days ago | 28 mins Antivirus For Amazon S3 Workshop: Malware Scanning For Application Workflows Ed Casmer, Founder & CTO, Cloud Storage Security // Gokhul Srinivasan, Sr. Partner Solutions Architect, Amazon Web Services Because of Amazon S3’s flexibility and performance, a growing number of organizations use it as the object store for files uploaded by application use... August 16, 2022 3:00pm Live Demo - Advanced Purple Team Framework Arien Seghetti, Solutions Architect Your security posture should be as unique as your company. With the Advanced Purple Team Framework, you can create customized and automatic blue and r... 3 days ago | 31 mins Mimikatz Tool (Explained) - Threats in 3 Minutes Esther, Product Expert Mimikatz exploits Windows' single sign-on capability to harvest credentials. Until Windows 10, a feature called WDigest was used to save encrypted pas... 3 days ago | 3 mins Load more