Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... February 7, 2023 10:00am 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... February 14, 2023 10:00am A new approach for browser-based performance testing Bryan Cole To effectively verify performance under load, your performance testing strategy should include both protocol and browser-based testing. But traditiona... 1 week ago | 14 mins Digital Certificates - Industry Updates and best practices Paul van Brouwershaven, Director Technology Compliance The TLS/SSL landscape is evolving, and it is no longer about which TLS/SSL certificate a public certification authority can provide, but about which u... 2 months ago | 46 mins The 2022 Open Source Year in Review Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general co... 1 week ago | 67 mins Automotive Cybersecurity: Device Tamper Protection & Secure Over-the-air Updates Priyank Kumar, Senior Director IoT and Payments Utimaco | Alois Kliner VP Automotive and IoT Manufacturing Utimaco Security risks do not commence when the production of the automobile is finalized; they begin at the point of manufacture, where individual components... 2 months ago | 61 mins 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... February 21, 2023 10:00am 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... February 28, 2023 10:00am Treasury and liquidity investing – Bank of England update Craig Inches, Head of Rates and Cash Craig Inches, Head of Rates and Cash, discusses the implications of the Bank of England Monetary Policy Committee (MPC) meeting and what the latest ra... 2 days ago | 24 mins Fluent Updates in Ansys 2023 R1 Sina Ghods, Senior Application Engineer - CFD & FEA, PADT Ansys 2023 R1 enables engineering teams to handle the complex challenges required to develop the next generation of world-changing products. Advances ... 3 days ago | 47 mins Load more