Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date DevSecOps: Implémenter la sécurité dans les chaînes DevOps Laurent Le Bourhis, Ingénieur Avant Vente Travailler en mode DevOps est désormais très répandu, et maintenant le mouvement DevSecOps est en plein essor. Mais l'intégration de la sécurité appli... 15 hours ago | 35 mins The Future of AppSec: What You Need To Know Chai Bhat, Solutions Manager The Forrester report, “The State of Application Security: 2022,” notes that web application exploits are the third-most-common cybersecurity attack. O... 7 days ago | 38 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 weeks ago | 28 mins How to Establish Automotive Fuzz Testing? John McShane, Senior Product Manager | Nico Vinzenz, Cybersecurity Expert | Daniel Teuchert, Application Security Engineer Fuzz testing is effective in uncovering vulnerabilities and robustness issues in automotive products. The results are improved development times and l... 4 weeks ago | 51 mins AppSec vs. NetSec Jonathan Knudsen, Head of Global Research Software security is a large and complicated topic, with a bevy of acronyms and inconsistently applied terminology. In this webinar, Jonathan Knudsen... 2 weeks ago | 28 mins The Future of AppSec: What You Need To Know Chai Bhat, Product Marketing Manager The Forrester report, “The State of Application Security: 2022,” notes that web application exploits are the third-most-common cybersecurity attack. O... 1 month ago | 38 mins Software Risk is Business Risk Per-Olof Persson, Principal Solution Advisor, Synopsys Software risk is not only a technology problem. It is a business problem. Once you deploy and use software, you own the risk that comes with it. No m... 1 month ago | 34 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... April 20, 2023 3:00pm The Rapid7 Annual Vulnerability Intelligence Report [EMEA] Caitlin Condon, Erick Galinkin and Ron Bowes from the Rapid7 Research team Rapid7’s Vulnerability Intelligence Report is an annual research report that highlights CVE exploitation trends, explores attacker use cases, and offe... March 30, 2023 10:00am A Demo of Vulnerability Risk Management Data Aggregation and De-duplication Tony Taylor, Vulcan Cyber solutions architect | Mike Parkin, Vulcan Cyber engineer Sherlock Holmes said, "It is a capital mistake to theorize before one has data." Enterprise vulnerability management teams know exactly what Sherlock ... March 30, 2023 4:00pm Load more