Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date What the EU Cyber Resilience Act Means for AppSec Michael White, Technical Director and Principal Architect & Per-Olof Persson, Principal Solution Advisor Europe, Synopsys With the cost of cyberattacks predicted to cost $10.5 trillion by 2025, the European Commission is looking to transform the cybersecurity landscape th... 10 hours ago | 34 mins 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... 9 hours ago | 10 mins Take Action: Putting Open Source Risk Management Policies to Work Aditi Sharma, Dell; Patricia Tarro, Dell; Mike Phillips, Dell & Anthony Decicco, GTC Law Group Once you have a grasp on how open source can both benefit and introduce risk to your organization, your next consideration should be learning to manag... 5 days ago | 51 mins Coffee with a Slice of SBOM Mike McGuire, Senior Software Solutions Manager, Synopsys For a variety of reasons, everyone is talking about software Bills of Materials (SBOMs). Some organizations are being required to generate and provide... 1 week ago | 42 mins Open Source: A Key Link in the Software Supply Chain Anthony Decicco, GTC Law Group Open source makes the world go round. It’s easy to use and simple to plug in. Used correctly, it gives you the competitive edge you need to focus more... 3 weeks ago | 41 mins Takeaways from Recent Software Supply Chain Developments Anthony Decicco, GTC Law Group Modern application development and deployment models make for a software supply chain that’s more complicated than ever before. While managing the ope... March 2, 2023 9:00am 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... February 14, 2023 10:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... February 21, 2023 10:00am Leveraging Technology Today to Build the Supply Chain of the Future Paul Nashawaty, ESG; Sudhindra K Ghanathe, Accenture; Ashwin Sridhar, Google Cloud; Vikram Murthi, o9 The importance of an efficient supply chain was made clear to everyone in 2020, when unforeseen disruption wreaked havoc throughout the retail ecosyst... February 9, 2023 4:00pm VMware Explore 2022: DevSecOps Highlights Hirenkumar Rupani, APJ Portfolio Marketing - VMware Tanzu, VMware Recently, at our flagship VMware Explore events in San Francisco and Barcelona, we conveyed our commitment to enabling our customers to journey from a... February 8, 2023 3:30am Load more