Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date What is SAST? Corey Hamilton, Security Solutions Manager, Synopsys Static application security testing (SAST) is a key ingredient of any AppSec program. However, modern applications are built using processes, language... 23 hours ago | 29 mins Zero Trust Architecture. Establishing a security blueprint: step by step Dr. Christopher Meyer, Product Manager Utimaco | Dr. Fabian Eidens, Technology Manager Utimaco Zero Trust Architecture. Establishing a security blueprint - step by step, brick by brick: Things to bear in mind when building your Zero Trust Archit... June 7, 2023 8:00am Ensure security with DevSecOps Deveeshree Nayak, Assistant Teaching Professor | University of Washington In this in-depth talk, University of Washington's Deveeshree Nayak will discuss the benefits of implementing DevSecOps in businesses, emerging DevSecO... June 6, 2023 5:00pm Coffee with a Side of DevSecOps Steven Zimmerman, DevSecOps Solution Manager, Synopsys To build security into DevOps and achieve true DevSecOps, organizations need to manage AppSec workflows without hindering speed and flexibility. But h... June 8, 2023 12:00pm A CXO's guide to application security in the age of digital transformation Elango Balusamy, Co-founder & CTO | SquareShift Technologies Enterprises are increasingly relying on applications to drive business growth and success in the age of digital transformation. However, the rise of c... June 6, 2023 8:00am It’s Time for AppSec to Evolve Patrick Carey, Product Marketing | Katie Crabtree, Product Manager | Greg Patton, Application Security Director Organizations continue moving their business applications and services to the cloud. With this shift, you need solutions that can keep up with your de... 1 week ago | 33 mins AI Strategy, Security, and Governance: The View from the Top Sayoko Blodgett-Ford, GTC Law Group and Jamie Boote, Synopsys The Board and C-Suite are starting to take notice of the opportunities and risks inherent with powerful new generative artificial intelligence (GAI) t... June 7, 2023 4:00pm Session 2: Protect Your Apps and APIs across a Distributed Cloud Richard Bible, F5 Senior Solutions Engineer With cloud architectures, protecting both the application business logic and the underlying infrastructure is paramount. With the F5 Distributed Cloud... 3 days ago | 32 mins IIoT cybersecurity threats: how to run complete protection at gateway level Sekou Roland Sako, Security Researcher at ICS CERT Kaspersky and Andrey Sazonov, Project manager at Aprotech Today Industry 4.0 is transforming from a concept to an everyday reality. Industrial internet of things (IIoT) is a key contributor to this evolution.... 3 hours ago | 38 mins Protect Against Payment Fraud with reCAPTCHA Enterprise Amitai Rottem - Senior Product Manager, Financial Fraud Protection Detecting and responding to bots and fraud has become vital to organizations and ensuring security for their users. Attackers are carrying out more so... 14 hours ago | 24 mins Load more