Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Shift Left: Five Reasons Why You Should Extend DevSecOps to Your SAP Environment David D'Aprile, VP of Product Marketing, Onapsis What is DevSecOps? It is the process of implementing security best practices within the application development lifecycle. As digital transformation p... 2 days ago | 26 mins Shifts in the Threat Landscape Jon Clay; VP, Threat Intelligence, Trend Micro The events of the past few years have shifted the threat landscape. Understanding your attack surface starts with recognizing the motivations behind c... April 4, 2023 11:00am DEMO - See Workload Protection, WAF and API Security in Action Ivan Melia, Senior Manager Product Marketing, Prisma Cloud by Palo Alto Networks Join us for a 30-minute demo session to see how to get complete security across your application lifecycle with Cloud Workload Protection by Prisma Cl... 3 days ago | 34 mins Emotet Exposed: Inside the Cybercriminals’ Supply Chain Giovanni Vigna: Sr. Director Threat Intelligence and Stefano Ortolani: Staff Engineer 2, Threat Research Lead In this new analysis, we’ll delve deep into the most recent waves of the Emotet botnet, providing never-before-seen insights into the malware delivery... 2 weeks ago | 60 mins Crypto-Agility and Preparing Now for Post-Quantum Cryptography Asif Karel, Director of Product Management, AppViewX Despite the many promising opportunities and benefits, there is little doubt that quantum computers with sufficient processing power will eventually b... 1 week ago | 44 mins API Protection in 2023: Staying Ahead of the Game and Safeguarding Your Data Aakash Tiwari, Security Engineer at Cequence Security For 2023, there’s no reason to doubt that APIs will continue to be a top target for attackers, resulting in theft, fraud, and business disruptions. Ga... 3 days ago | 48 mins Emotet Exposed - Inside the Cybercriminals Supply Chain Giovanni Vigna (Sr. Director of Threat Intelligence, VMware) and Stefano Ortolani (Threat Research Lead, VMware) New analysis from VMware delves deep into the most recent waves of the Emotet botnet, providing never-before-seen insights into the malware delivery m... 1 month ago | 60 mins A Demo of Risk-Based Vulnerability Lifecycle Management in Action Tony Taylor, Vulcan Cyber solutions architect | Mike Parkin, Vulcan Cyber engineer Most enterprise cyber security organizations invest in multiple vulnerability scanners to ensure coverage for all traditional and cloud-native surface... 3 weeks ago | 32 mins Utilizing Threat Intelligence Throughout the Lifecycle of a Threat Luke Amery, Solution Architect ANZ at Anomali Cybersecurity professionals responsible for defending their organizations are undoubtedly familiar with the scramble to respond to a newly announced z... 4 months ago | 40 mins The Future Is Agentless: Cloud Security for Modern Environments Sagy Kratu, Director of Enablement and Evangelism and Jason Silberman, Senior Product Marketing Manager Traditional agent-based cloud security tools have blind spots. They either can’t see all of your cloud assets or can’t analyze them with proper risk c... 2 months ago | 36 mins Load more