Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 weeks ago | 28 mins XPOSURE 2023 - Security Validation Fundamentals for Executives Ran Tamir, CPO & Yuval Lazar, Senior Security Researcher & Technical Product Manager at Pentera In spite of organizations’ continuous investment in strengthening their security defenses, security teams struggle with answering a simple question: W... 16 hours ago | 15 mins XPOSURE 2023 - DNS: The Favority Adversary C2 Channel Uriel Gabay, Senior Security Researcher at Pentera Attackers are increasingly leveraging security control misconfigurations to breach networks, and DNS attacks, in particular, are a popular way to do s... 16 hours ago | 15 mins XPOSURE 2023 - IPv6: Security Teams’ Blind Spot Yotam Mazurik, Senior Security Researcher at Pentera The rapid pace of technological advancement means that security frameworks like MITRE ATT&CK or NIST may not always have the most up-to-date informati... 16 hours ago | 15 mins XPOSURE 2023 - Adversary Abuse of Leaked Credentials Matt Bromiley, Lead Solutions Engineer at LimaCharlie Leaked credentials are one of the most common entry points for an adversary into an organization. Time and time again, we see some of the best laid pl... 16 hours ago | 22 mins XPOSURE 2023 - What 300 CISOs Say About 2023? - Poll Results Unveiled Aviv Cohen, CMO at Pentera Interested in benchmarking yourself about 2023 plans against 300 of your peers? This is the right session for you. Recent world economic trends are... 16 hours ago | 11 mins XPOSURE 2023 - Detection-as-Code: Test Driven Detection Development Mauricio Velazco, Principal Threat Research Engineer at Splunk In today's fast-paced digital landscape, security operations must adapt to meet the ever-evolving threat landscape. Detection-as-Code is a new approac... 16 hours ago | 16 mins XPOSURE 2023 - Think Graphs Not Lists: Making Exposure Management Pragmatic Amitai Ratzon, CEO at Pentera It's time to break away from traditional IT risk management techniques and embrace a fresh, practical approach: Exposure Management. With the increasi... 17 hours ago | 10 mins Cymulate Cyber Resilience 2023: Lessons Learned from 1.5 Million Hours of Tests Mike DeNapoli, Director, Cybersecurity Architect, Cymulate Cymulate Cybersecurity Effectiveness Report: What We Learned from 1,725,720 Hours of Security Testing In one year, Cymulate has helped customers wi... 1 day ago | 60 mins Pentera Labs x AppSec Meetup: The Hacking games - Cloud Vulnerabilities Uriel Gabay, Security Reseracher, Pentera | Gidi Farkash, Pipl Security | Shlomi Ben Hur, Opentext | Simon Bruno, Deepblue Our data and infrastructure were shifted to the cloud, and we are more and more relying on our DevOps engineering and Cloud Providers to keep us safe ... 3 days ago | 96 mins Load more