Most Recent Videos
In this webinar, we talk about our ongoing research in automating attack trees for security control generation. Learn from use cases on how to scale attack trees.
Traditional threat modeling approaches don’t fit easily in today's fast-moving DevOps pipelines. Is there a way to speed-up these traditional processes?
Developers make software updates to add new features, enhance their structures, or fix bugs. These frequent changes occasionally impact the security of the software, for instance, by breaking authenti
The swift move to remote work has raised many concerns about security. Get recommendations on securing remote access with real-world examples.
Learn how you can quickly enable and modify project classifications, filter problems to help with prioritization, and more!
In the fast-evolving tech world, security teams must be able to explain how they provide business value without using complicated jargon. Let's learn how.
We are organizing this webinar to help job seekers find the right opportunities during these challenging times. As recruiters, we want to give you the inside scoop on how we think and share some essen
As web applications migrate to cloud environments and interactions between services become more complex, server-side request forgery (SSRF) attacks pose an increasing threat to businesses. Security te
In today’s world, privacy concerns during software development are critical. We need to consider how we collect, store, share, and archive information across the DevSecOps process in a way that respec
Join our webinar for insight into the MITRE ATT&CK framework. Our team uses this framework extensively in on-premise infrastructure testing and during purple team exercises to test security controls.
Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core
Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline. We will also review the best practices for secure
Threat modeling can lead to conflicts between security experts and developers as it's time-consuming and delays releases. Learn how to engage developers in security.