Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Future of AppSec: What You Need To Know Chai Bhat, Solutions Manager The Forrester report, “The State of Application Security: 2022,” notes that web application exploits are the third-most-common cybersecurity attack. O... 1 week ago | 38 mins Takeaways from Recent Software Supply Chain Developments Anthony Decicco, GTC Law Group Modern application development and deployment models make for a software supply chain that’s more complicated than ever before. While managing the ope... 1 month ago | 42 mins The Future of AppSec: What You Need To Know Chai Bhat, Product Marketing Manager The Forrester report, “The State of Application Security: 2022,” notes that web application exploits are the third-most-common cybersecurity attack. O... 1 month ago | 38 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 weeks ago | 28 mins Under the Hood: Preemptive Web Application Protection using Contextual AI/ML Jeff Engels, Cloud Technical Marketing Engineer, Check Point Software Technologies. Join this upcoming webinar to learn about CloudGuard AppSec, a next-generation web application firewall (WAF) that provides superior protection for we... 3 days ago | 48 mins Secure, Scalable and Consistent Application Delivery in a Multi-Cloud World Frank Yue, Vijayendra Singh As Enterprises increasingly span their workloads across on-premises data centers and cloud environments, it is becoming significantly complex for IT t... 3 days ago | 58 mins F5 and AWS: Protect your APIs and Guard Against Automated Threats Jerald Cheong, Solutions Architect F5 & Ram Cholan, Senior Solutions Architect, Edge Services, Amazon Web Services Rapid application updates, third-party APIs and malicious bots expose your businesses to risk. Organizations are looking for secure, reliable, perform... 2 days ago | 49 mins Build, Validate, Execute: Connect Agile requirements with Testing results Jonny Steiner, Product Marketing Manager and Yogev Baron, Sr. Product Manager Agile processes are being implemented and adopted at a rapid pace, with the focus on enabling the delivery of high-quality web and mobile apps at spee... April 5, 2023 2:00pm The DDoS Threat Landscape 2023 Karl Triebes, SVP Product Manager Application Security - Imperva and David Holmes, Senior Analyst - Forrester DDoS attacks were the cyber weapon of choice last year, used widely by hacktivists to disrupt governments and national security assets to create insta... April 4, 2023 12:00pm Effective Ways to Augment Your Microsoft 365 Defence Jennifer Cheng, Cybersecurity strategy, APJ, Proofpoint | Alex Sheppard, Sr Sales Engineer, Proofpoint Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. Default email and cloud se... 5 days ago | 78 mins Load more