Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Making It All Work Jeff Lawson, Product Management | Peter Monahan, Dir., Solutions Architecture | Vishrut Iyengar, Product Marketing A Practical Guide to Operationalizing the Modern AppSec Framework You need to modernize your application security program and you know how you are go... 6 days ago | 59 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 2 weeks ago | 28 mins 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 3 weeks ago | 61 mins What is sustainable IT practice and why should I care? Russell Fowler, Founder & Director | GreenFuture Technology Consulting Ltd Addressing environmental and social impact is now a business imperative to retain customers, attract talent and to comply with evolving regulations an... June 20, 2023 10:00am The DoControl SaaS Security Platform: Shadow Applications Governance Guy Rosenthal, VP or Product, DoControl; Corey O’Connor, Director of Product Marketing, DoControl DoControl’s Product team will highlight a new module within the DoControl Software as a Service (SaaS) Security Platform. This new module will extend ... February 1, 2023 6:00pm How to Create a 360° Ransomware Recovery Plan James Keating, StorONE Solutions Architect and Ted Oade, Seagate Director, Product 3-2-1 means nothing without a comprehensive plan Losing all or some of your data from a ransomware attack can destroy a business. And even worse, acc... 5 days ago | 58 mins Live Demo - Ransomware - January 24th Arien Seghetti, Solutions Architect As ransomware mutates into more sophisticated forms, cybersecurity defenses must evolve with it or leave companies exposed. With an estimated 4 thous... 1 week ago | 31 mins Webinar - Live Nexus Lifecycle Demo Joe Bernie - Senior Solutions Engineer - Sonatype To develop software fearlessly, you need transparency and automation across all third-party components and libraries. Experience zero productivity a... February 8, 2023 11:30am Finance Automation: A Critical Step in Your Digital Transformation Journey George Lyon, EMEA solution consultant, SAP Concur If you’re like many business owners, you probably digitally transformed at least some of your business operations to counter disruptions in recent yea... February 8, 2023 11:00am XDR – Where Do I Start? Focus On Security Outcomes Not Technology Nathan Jenniges, Vice President, Strategy & Product Management, BlackBerry XDR technology claims are rampant. Many fail to deliver on expectations. CylanceGUARD® delivers the security promise of XDR by blending people and tec... 1 week ago | 17 mins Load more