Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Reinventing MDR With Identity Threat Protection (EMEA) Ryan Romagnolo (Senior Intrusion Researcher, Falcon OverWatch), Craig Sohn (Sr. Analyst, Falcon Complete) Identity is the front line in the battle against modern cyber threats. Nearly 80% of cyberattacks leverage compromised credentials to gain access and ... 4 days ago | 36 mins 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... 2 weeks ago | 10 mins 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am How Blockchain is Driving Transparency Across the Supply Chain Jolanda Kooi - tex.tracer Bart Westerman - tex.tracer Gunjan Bassi - IDC Frederik De Breuck - Fujitsu According to an IDC survey, 61% of the European manufacturers increased their spending on technology associated with sustainability programs in 2021. ... July 21, 2022 1:00pm Zero Trust Segmentation: The Key to Cyber Resilience Raghu Nandakumara, Head of Industry Solutions at Illumio | John Grady, Senior Analyst at ESG If cyber threats are keeping you up at night, you’re not alone. New research by analyst firm Enterprise Strategy Group found that 76% of surveyed orga... 5 days ago | 40 mins 2021 OWASP Top 10: Insecure Design - Ep 4 John Wagnon, Solutions Architect, F5 Security needs to be inherent to applications. A secure design can still have implementation defects leading to vulnerabilities. An insecure design ca... 3 weeks ago | 8 mins 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... July 14, 2022 9:00am Securing the Software Supply Chain: More Than Just an SBOM? Guest: Sandy Carielli, Forrester Research | David London, Chertoff Group | Tim Mackey, Synopsys | Patrick Carey, Synopsys Gone are the days when you only had to worry about the code your developers are writing. Now you have to think about a complex supply chain, which inc... August 23, 2022 8:00am Open-Source Risk: The Ground Zero of Software Supply Chain Security Mike McGuire, Security Solutions Manager, Synopsys; Brandon Dunlap, Moderator When approaching software supply chain security, managing the risk related to open-source usage is often a top consideration for builders of applicati... June 28, 2022 12:00pm Supply chain targeting: trends and predictions for 2022 Ben Brigida, Director, SOC Operations at Expel and Ray Pugh, Manager, Security Operations at Expel Join Expel, a managed detection and response (MDR) provider offering 24x7 security monitoring and response for cloud, hybrid and on-premises environme... June 28, 2022 4:00pm Load more