Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Broken Access Control - Ep 1 John Wagnon, Solutions Architect, F5 94% of tested apps showed some form of broken access control. Failures can result in unauthorized disclosure, modification or destruction of data, pri... 11 hours ago | 11 mins A CISO Discussion: Don't "Default" on Email Security Ed Harris, CISO Mauser Packaging and Mike Bailey, Manager of Product Marketing Proofpoint With an increase in sophisticated phishing attacks like supplier fraud, ransomware threats, and account compromise attempts, default email security ca... May 19, 2022 8:15am OWASP Top 10 Overview John Wagnon, Solutions Architect, F5 John starts out explaining what the OWASP Top 10 is. He highlights themes like risk re-orientation around symptoms and root causes, new risk categorie... 1 week ago | 9 mins Conozca como AWS y Barracuda protegen a sus empleados, su red y aplicaciones Miguel López [Country Manager Iberia], José Juan Díaz [Pre-Sales Engineer Iberia] Asista a este seminario web, co-presentado por AWS y Barracuda, y obtenga los conocimientos más recientes para desplegar arquitecturas de red modernas... May 24, 2022 9:00am Modernize Your Data Loss Prevention Strategy for Today's Challenges Itir Clarke, Manager of Product Marketing and Stephanie Torto, Senior Product Marketing Manager The rapid adoption of remote work and transition to the cloud have required many security teams to face a familiar question: are our legacy data loss ... 4 days ago | 32 mins Specialized ITSM for Hybrid Work & Global Teams II: Managing Cloud-Native Apps Francesco Altomare, Regional Sales Manager S. Europe at GlobalDots & Ovidio Maiuri, Chief Digital Officer at Challenger Stone ITSM solutions to manage the productivity, security and compliance of today's work, workforces and workplaces - PART 2 Join us to learn about the cha... May 18, 2022 9:00am 2021 OWASP Top 10: Injection - Ep 3 John Wagnon, Solutions Architect, F5 Injection is a broad class of attack vectors where untrusted input alters app program execution. This can lead to data theft, loss of data integrity, ... May 30, 2022 9:00am Vulnerability Management in 2022: Reduce Your Attack Surface Diana Kelley, SecurityCurve and Guests In 2022, your attack surface will be larger than ever before. From the onset of the hybrid workforce to huge waves of data being produced, security te... June 15, 2022 4:00pm Bad Bots on the Attack: Guidance to Protect Against Online Fraud Peter Klimek, Director of Technology, Office of the CTO, Imperva and Sandy Carielli, Principal Analyst, Forrester Leveraging data from our global network, the Imperva Threat Research team investigates the rising volume of automated attacks occurring daily, evading... May 17, 2022 5:00pm The Application Attack Threat Landscape - After Log4J Sean Flynn - Director of Security Technology and Strategy, Akamai Modern web applications have become complex, heavily reliant on APIs for virtually every online interaction. This complexity brings with it the potent... May 17, 2022 5:00pm Load more