Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 3 weeks ago | 61 mins The Lawyer's Guide to a Comprehensive Open Source Compliance Program Kate Downing, Law Offices of Kate Downing Note: This is the replay of a webinar that originally aired on Nov. 16, 2022. Today, nearly every company that builds applications uses open-source ... 1 week ago | 63 mins Secure Code Review: Catching Vulnerabilities at the Source Dan Mateer, HackerOne, Will Barrett, Tranzito Security vulnerabilities discovered in applications are almost always rooted in security flaws in source code. Here, weaknesses may be logical errors,... 3 months ago | 34 mins By the Numbers: Open Source Risk in M&A Phil Odence, Synopsys Open source is widely used in software development because it allows you to create high-quality software quickly. But if left unmanaged, open source c... 6 months ago | 60 mins Important eDiscovery Case Law Decisions for August 2022 Doug Austin, Hon. Judge Andrew Peck (ret.), Tom O'Connor & Mary Mack We don’t “horse around” when it comes to eDiscovery case law disputes! Our August monthly webinar of cases covered by the eDiscovery Today blog discu... 5 months ago | 64 mins How RetailMeNot Migrated from a Monolith to a Supergraph Hannah Shin, Senior Software Engineer, RetailMeNot and Kartik Kumar Gujarati, Senior Software Engineer, RetailMeNot Like many early adopters of GraphQL, RetailMeNot started on a GraphQL monolith. However, their API team found themselves spending most of their time d... 9 months ago | 21 mins An Introduction to the MITRE ATT&CK Matrix Horangi Director of Offensive Services, Che Lin Law Leveraging the attack matrix to build up a layered defence in depth strategy. 2 years ago | 53 mins IP Strategy: Tackling Open Source Software Martin Callinan, Source Code Control In this webinar, we'll dive into the latest developments in managing Open Source Software as part of your IP strategy. The webinar will review recent ... 4 years ago | 42 mins Automating Open Source Security: A SANS Product Review of WhiteSource Serge Berso, SANS Community Instructor and Analyst, and Rami Elron, Senior Director of Product Management at WhiteSource Open source components have become the key building blocks for application development in today's market, allowing companies to assemble their product... 4 years ago | 63 mins Analyst Hour: False Sense of Security — Shadow Code Remains a High Risk Michael Osterman, President, Osterman Research Inc & Kim DeCarlis, CMO, PerimeterX More than 90% of websites use third-party scripts and open source libraries for common functions such as payments, customer reviews, tag management an... 1 year ago | 47 mins Load more