Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing the Software Supply Chain: More Than Just an SBOM? Guest: Sandy Carielli, Forrester Research | David London, Chertoff Group | Tim Mackey, Synopsys | Patrick Carey, Synopsys Gone are the days when you only had to worry about the code your developers are writing. Now you have to think about a complex supply chain, which inc... 2 months ago | 59 mins Ransomware Live Attack & Defend Demo Tom Brown, Alex Sayavedra, Alice Allsop, Marc Paridimal (CrowdStrike) Threat actors are getting bolder, stakes are higher, ransom costs and extortions are growing exponentially. These attacks can cause huge financial and... March 2, 2023 10:00am Holiday Cyber Attacks [EMEA] Christian Heggen (Strategic Threat Advisor) The festive season presents numerous new highs of business amongst retail entities and consumers which also means a huge amplification of opportunitie... 2 months ago | 48 mins Ransomware Live Attack & Defend Demo [EMEA] Tom Brown, Alex Sayavedra, Alice Allsop, Marc Paridimal (CrowdStrike) Threat actors are getting bolder, stakes are higher, ransom costs and extortions are growing exponentially. These attacks can cause huge financial and... 5 months ago | 61 mins Securing the Supply Chain with Multi-Signal Defense Kill Chain Spence Hutchinson, Principal Threat Researcher In this webinar, Spence Hutchinson, Principal Threat Researcher with eSentire’s Threat Response Unit (TRU), Spence discusses: - The top cyber threats ... 13 hours ago | 35 mins 2021 OWASP Top 10: Insecure Design - Ep 4 John Wagnon, Solutions Architect, F5 Security needs to be inherent to applications. A secure design can still have implementation defects leading to vulnerabilities. An insecure design ca... January 31, 2023 10:00am Integrating Secure Code Signing in the CI/CD Pipeline Ryan Sanders, Sr. Dir Product & Customer Mktg & Eric Mizell, VP of Field Engineering Keyfactor; Brandon Dunlap, Moderator Code signing is a powerful method to protect the integrity of containers, artifacts, and software across the continuous integration and continuous dep... January 31, 2023 6:00pm Applying Chain of Trust Principles to Data Protection Ed Soo Hoo - Lenovo DCG Field C Suite Innovation and Transformation Exec and Greg Tevis - Cobalt Iron VP of Global Strategy Join us for a virtual Lenovo Data Center Customer Briefing An unsettling trend is underway as attackers are now targeting backups, the very systems t... February 1, 2023 9:30pm Securing the Software Supply Chain Jeff Martin, Vice President of Product Management at Mend Securing the Software Supply Chain Key Findings From the Mend Open Source Risk Report Open source vulnerabilities are in permanent growth mode. A sig... February 2, 2023 6:00pm Sidestepping a Cyber Car Crash in Matrix Time Maurits Lucas - Director of Product Marketing (Intel 471) Ransomware is like a slow moving car crash, incidents don't occur in an instant. The cyber underground is ripe with indicators that can predict an att... 5 days ago | 47 mins Load more