Join Jeremiah Grossman, Founder & CEO of Bit Discovery, and Rohit Sethi, COO at Security Compass, to discuss Shadow IT, one of the most pressing operational challenges today. Learn how you can get a handle on discovering and securing Shadow IT web applications through automation.
Most Recent Videos
We are organizing this webinar to help job seekers find the right opportunities during these challenging times. As recruiters, we want to give you the inside scoop on how we think and share some essen
As web applications migrate to cloud environments and interactions between services become more complex, server-side request forgery (SSRF) attacks pose an increasing threat to businesses. Security te
In today’s world, privacy concerns during software development are critical. We need to consider how we collect, store, share, and archive information across the DevSecOps process
Join our webinar for insight into the MITRE ATT&CK framework. Our team uses this framework extensively in on-premise infrastructure testing and during purple team exercises to test security controls.
Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core
Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline.
In this webinar, we will discuss an approach where we leverage the help of Engineering to significantly increase the coverage of threat modeling across an organization’s entire application portfolio.
Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation.
Many large enterprises and government units prefer to run applications in private clouds, and cannot accept SaaS solutions. Watch this webinar to understand some microservice solutions!
Many times DevSecOps is thought of as an enabler for speed. But what if speed introduces unnecessary business risk? Is it still a valuable business investment? Is there a balanced approach that helps
In this webinar, learn some practical steps your organization can take to implement CCPA-compliant privacy notices and web applications.
Take a look back on how the GDPR has impacted businesses a year and a half on from its May 2018 implementation
Architecture security is a complex and often undervalued topic in most enterprises and in software products. It becomes even more challenging in scenarios involving continuous delivery and scalability
US Senate Bill 327 “Information privacy: connected devices” defines a new standard to address the security of connected devices. California was the first in the United States to pass a law that legisl
In this webinar, explore: - Challenges of traditional risk assessment - Frameworks for agile and automated risk assessment - Benefits of modernized risk assessment activities