Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... July 14, 2022 9:00am 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... July 21, 2022 9:00am 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... July 28, 2022 9:00am 2021 OWASP Top 10: Server Side Request Forger - Ep10 John Wagnon, Solutions Architect, F5 SSRF flaws occur when a web app fetches a remote resource without validating the user-supplied URL. Attackers can coerce the app to send a request to ... August 4, 2022 9:00am A Look at Cyber Trends by Healthcare Provider Departments Ryan Witt, Proofpoint Industries Solutions and Strategy Leader Healthcare continues to be a persistent cyber target for threat actors. These threat actors are leveraging new trends to evolve their attack surface a... 5 hours ago | 32 mins Using Behavioral Analysis and AI/ML to Stop Phishing Attacks Adam Starr- Proofpoint AI/ML expert & Mike Bailey- Cybersecurity Strategist Every day attackers try new phishing techniques: crafty business email compromise (BEC), abusing legitimate filesharing sites, impersonating suppliers... 2 hours ago | 33 mins Bot Attacks: Top Threats and Trends Nitzan Miron [VP, Product Management, Application Security], Tushar Richabadas [Senior Product Manager, Application Security] How is your business detecting and blocking bad bots that execute web scraping, account takeover, distributed denial of service (DDoS), and other atta... June 30, 2022 9:00am Stop Ransomware in its Tracks- Ending Ransomware Early in the Kill Chain David Finger, David Lorti There are many opportunities along the cyber kill chain to thwart a ransomware attack, but it’s best to stop it from getting to the end user/device in... 7 hours ago | 54 mins Deploy Top-Tier Tools to Guard Supply Chains Ryan Witt, CISO Proofpoint and Government Technology Experts Today’s supply chain risk management (SCRM) strategies possess flexibility that can help alleviate the burden placed on agencies, and the right partne... 7 hours ago | 59 mins Load more