Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Open-Source Risk: The Ground Zero of Software Supply Chain Security Mike McGuire, Security Solutions Manager, Synopsys; Brandon Dunlap, Moderator When approaching software supply chain security, managing the risk related to open-source usage is often a top consideration for builders of applicati... 7 months ago | 58 mins The Memory Attack Battleground Satya Gupta, CTO, Willy Leichter, VP, Virsec The multitude of recent cyberattacks have a number of things in common: they are sophisticated, multi-pronged, use fileless techniques, and target app... 5 years ago | 58 mins What Your Vulnerability Scanner is Not Telling You Anand Paturi and Barry Cogan A recent, significant data breach in 2017 has caused people to take a deeper look into Apache Struts vulnerabilities. This weakness emphasized the imp... 5 years ago | 41 mins Targeted Defense: The Future of Defending Applications in Production Mahesh Babu, General manager, Runtime Protection, at Contrast Security Raise your hand if this is you: - Our development teams have a massive security backlog and can’t fix everything in code - We need to protect legacy ... 5 years ago | 70 mins Struts une approche complète pour détecter et bloquer la célèbre vulnérabilité. Rémi Le Mer, Product Manager, Web Application Firewall et Leif Kremkow, Directeur Technique La vulnérabilité STRUTS tout le monde en parle mais en fait c’est quoi ? Comment la détecter et la patcher ? Apache a récemment annoncé être exposé ... 6 years ago | 36 mins Understanding Your Attack Surface and Detecting & Mitigating External Threats Ulf Mattsson, CTO Atlantic BT. David Morris, Pioneer in Cybersecurity, Benjamin Powell, Technical Manager at RiskIQ Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there reall... 5 years ago | 62 mins Weekly Vulnerability Analysis: Episode 2 Satya Gupta, CTO Virsec Security Research Lab publishes a weekly analysis of the top vulnerabilities that have a large potential impact, high severity level, and shoul... 2 years ago | 13 mins Struts-Shock: Current Attacks Against Struts 2 and How to Defend Against Them Johannes Ullrich Dean of Research, SANS Technology Institute The critical vulnerability recently discovered in Apache Struts 2 demonstrated the risks associated with open source components. Watch this on-demand ... 5 years ago | 44 mins Detect and Block Apache Struts Bug Across Your Enterprise Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-p... 6 years ago | 62 mins Application Security in an Open Source World Kunal Anand, Prevoty | Rob McCurdy, MSU | Nate Smolenski, New York Life | Andy Wickersham, Fortune 100 | Sean Martin, ITSP Thanks for your interest in our webcast where we will be discussing how to secure applications that rely on third-party and open source software. Asi... 5 years ago | 63 mins