Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Align Your ITSM and SecOps Strategy for Unstoppable IT Eric, Sr Director of Partnership at Freshworks | Chandrashekhar, CEO at SecPod To deal with the rising number of cyberattacks, ITSM strategy should align with SecOps (Security Operations). With SecOps functions merged within the ... 3 days ago | 42 mins Why Hackers Hack: Episode 1 - The Profile Tyler Moffitt, Snr Security Analyst, Opentext Security Solutions Hacking has become a common term in today's digital world, but not all hackers are the same. In this webinar, we will explore the different types of h... 1 week ago | 55 mins Battling Endpoint Cybercrime: Protecting Modern Businesses Nick Cavalancia, Conversational Geek | Kent Feid, Quest Software | Dan Garcia, EDB | Markus Abraham, Independent Consultant The workforce is changing at a rate few can keep up with. The impact of hybrid working, BYOD and IoT can take its toll on your security, open you up t... February 16, 2023 10:00am Fondations d'un programme global de sécurité applicative Hugues Martin, Ingénieur Avant-Vente, Synopsys Nos technologies, processus, et activités reposent tous sur des logiciels pour fonctionner, des logiciels auxquels il est nécessaire de pouvoir se fie... 1 week ago | 37 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 2 weeks ago | 28 mins 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 3 weeks ago | 61 mins DevSecOps: Implémenter la sécurité dans les chaînes DevOps Laurent Le Bourhis, Ingénieur Avant Vente Travailler en mode DevOps est désormais très répandu, et maintenant le mouvement DevSecOps est en plein essor. Mais l'intégration de la sécurité appli... March 29, 2023 9:00am Top Challenges With Shifting Security to Development Melinda Marks, Enterprise Strategy Research Group (ESG) | Tim Mackey, Synopsys With modern processes, software developers can quickly build and release applications by deploying them to the cloud. But security teams are strugglin... 2 months ago | 52 mins Case Study - The ROI of Managed Risk-Based Vulnerability Management Josh Allen, PurpleSec CPO | Jason Firch, PurpleSec CEO Watch this case study webinar by PurpleSec on the ROI of managed risk-based vulnerability management (RBVM) for a leading travel services provider. He... 21 hours ago | 29 mins Getting a Step Ahead of the Attacker with Vulnerability Scanning & Pen Testing Dan Murphy, Distinguished Architect, Invicti Security A panel discussion that has aired initially as part of the Dark Reading Virtual Event, sponsored by Invicti: Today’s threat landscape calls for a mor... 1 day ago | 49 mins Load more