Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Australian Institutions targeted by Hacktivist Groups: How to Stay protected Pascal Geenens, Director, Cyber Threat Intelligence | Ron Meyran, Senior Director, Corporate Enablement Over 100 Australian sites have become a prominent target for hacktivist attacks — including the public websites of governments, airports, healthcare, ... 20 hours ago | 41 mins The Future of AppSec: What You Need To Know Chai Bhat, Solutions Manager The Forrester report, “The State of Application Security: 2022,” notes that web application exploits are the third-most-common cybersecurity attack. O... 7 days ago | 38 mins Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... 1 week ago | 45 mins Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... 1 week ago | 45 mins Enabling the Enterprise with Private Wireless and Edge Computing Solutions Bob Laliberte, Principal Analyst (ESG); Ken Byrnes, Global Head, Telecom Line of Business (Dell Technologies) Across industries and use cases business leaders are poised to deliver enhanced and new experiences by implementing private wireless and edge computin... April 19, 2023 2:00pm Coffee with a Dash of DAST Rod Musser, Director Product Management and Vishrut Iyengar, Product Marketing Manager at Synopsys Security breaches can happen at any time. You need to stay ahead of the game and secure your applications—now. But how can you overcome application se... 2 weeks ago | 26 mins Container Security Essentials David Benas, Associate Principal Consultant, Synopsys As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applicatio... 3 weeks ago | 61 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 37 mins Optimize business application portfolios with APM James Ramsay, ServiceNow The acceleration of digital transformation has put an increased focus on how technology supports business strategy. With the growing size and complexi... 1 hour ago | 28 mins Your executives need to know - so show them everything Piyush Patel, ServiceNow In this short demo, we demonstrate what you can do to pull your executives—like your CIO or CTO—into your asset estate. Give them a dashboard for all ... March 29, 2023 8:30pm Load more