Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Sprint Through Software Development With Quality Metrics Wilhelm Haaker, Director of Solution Engineering Getting your application ready for release is a team effort. As a software development manager, you need to ensure that team members can work producti... 2 months ago | 48 mins Sprint Through Software Development With Quality Metrics Wilhelm Haaker, Director of Solution Engineering Getting your application ready for release is a team effort. As a software development manager, you need to ensure that team members can work producti... 1 week ago | 48 mins CMD+CTRL Labs: A Bridge to Better, More Secure Software Jason Shepard, Product Marketing Manager | Brandon Cooper, Solutions Engineer, Security Innovation Your team's first exposure to new threats should happen on OUR platform - not yours. With new CMD+CTRL Labs, your teams will build skills through hand... 1 month ago | 29 mins Webアプリケーションのハッキングをどう止める?~ ハックされる理由と課題の考察と対策 日本シノプシス合同会社 ソフトウェア インテグリティ グループ シニア セールス エンジニア 中野 哲也 ※本セミナーは、2022年10月の講演の再放送となります。ご質問がございましたら、Ask a questionのウィンドウまたはAttachmentsタブの中のお問合せフォームのリンクよりお送りください。 ※「WhiteHat DAST」は、「WhiteHat Dynamic」に名称変更いたしました... 1 week ago | 47 mins The Lawyer's Guide to a Comprehensive Open Source Compliance Program Kate Downing, Law Offices of Kate Downing Note: This is the replay of a webinar that originally aired on Nov. 16, 2022. Today, nearly every company that builds applications uses open-source ... 2 months ago | 63 mins Introduction to Decision Analysis Using PrecisionTree: Maintenance Plan Costs Rafael Hartke Decision trees are structured decision models containing sequences of decisions and events. They allow us to graphically map the plan throughout the l... 2 weeks ago | 57 mins Fortify Series: Securing the Software Supply Chain Stan Wisseman, John Keane, Kevin Greene, CyberRes and Emil Wåreus, Debricked Modern software applications and products are assembled from dozens if not hundreds of components, many of which nowadays are open-source projects. V... 7 months ago | 59 mins API Security: Preventing Vulnerabilities and Attacks Jiri De Jagere, Software AG & Sunil Dutt, Salt Security How vulnerable are your organization’s APIs? We’ve all begun to witness the tremendous business value potential that APIs bring, and how they can open... 3 months ago | 32 mins Rethinking GRC for Modern Software Development Phillip Ivancic and Michael McGrath Many enterprises have split their security functions between first-line defences, where AppSec tooling and penetration testing traditionally fits, and... 7 months ago | 31 mins How to Manage Permissions with Cloud Infrastructure and Entitlement Management Alfred Trevino, Cloud Technical Marketing Manager In this webinar we will see how using CIEM helps customers move closer to zero trust for permissions which in turn makes a much more secure environmen... 1 month ago | 73 mins Load more