Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Security Resilience in a Hybrid World Sean Earhard, Director of Sales Business Development, Cisco and Krystal James, Sales Business Development Manager, Cisco Security resilience is confronting a new world where everyone and everything is connecting. Businesses are operating as integrated ecosystems with bou... 2 days ago | 23 mins 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am Zero Trust Segmentation: The Key to Cyber Resilience Raghu Nandakumara, Head of Industry Solutions at Illumio | John Grady, Senior Analyst at ESG If cyber threats are keeping you up at night, you’re not alone. New research by analyst firm Enterprise Strategy Group found that 76% of surveyed orga... 1 week ago | 40 mins 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... July 14, 2022 9:00am Security Resilience in a Hybrid World Sean Earhard, Director of Sales Business Development, Cisco and Krystal James, Sales Business Development Manager, Cisco Security resilience is confronting a new world where everyone and everything is connecting. Businesses are operating as integrated ecosystems with bou... August 3, 2022 12:00pm 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... July 21, 2022 9:00am 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... July 28, 2022 9:00am 2021 OWASP Top 10: Server Side Request Forger - Ep10 John Wagnon, Solutions Architect, F5 SSRF flaws occur when a web app fetches a remote resource without validating the user-supplied URL. Attackers can coerce the app to send a request to ... August 4, 2022 9:00am Fireside chat with BitSight: A view from Infosecurity Europe on Security Ratings Richard Wall, Sales Director UKI, and Alfonso Hermosillo, Senior Consulting Engineer EMEA Infosecurity Europe came back strong this year in London as a face-to-face event, and BitSight wouldn't miss this opportunity to show once again the v... 2 hours ago | 11 mins Russia’s War on Ukraine and the Implications for Global Supply Chains Geraint John, Vice President, Resilience Lab, Interos Russia’s invasion of Ukraine has already taken an extraordinary toll on individuals, families and communities caught up in the war. Military conflict ... 1 week ago | 46 mins Load more