Error - something went wrong!
As prescribed by the new PCI Software Security Framework, learn how to transform policy into actionable tas...
In this webinar, we talk about our ongoing research in automating attack trees for security control generation. Learn from use cases on how to scale attack trees.
Traditional threat modeling approaches don’t fit easily in today's fast-moving DevOps pipelines. Is there a way to speed-up these traditional processes?
Developers make software updates to add new features, enhance their structures, or fix bugs. These frequent changes occasionally impact the security of the software, for instance, by breaking authenti
Aug 27, 2020 | Thursday; 11 a.m. (EDT)
Aug 16, 2020 | Thursday; 11 a.m. (EDT)
Aug 6, 2020 | Thursday; 11 a.m. (EDT)
In the fast-evolving tech world, security teams must be able to explain how they provide business value without using complicated jargon. Let's learn how.
We are organizing this webinar to help job seekers find the right opportunities during these challenging times. As recruiters, we want to give you the inside scoop on how we think and share some essen
July 30, 2020 | Thursday; 11 a.m. (EDT)
As web applications migrate to cloud environments and interactions between services become more complex, server-side request forgery (SSRF) attacks pose an increasing threat to businesses. Security te
In today’s world, privacy concerns during software development are critical. We need to consider how we collect, store, share, and archive information across the DevSecOps process in a way that respec
Join our webinar for insight into the MITRE ATT&CK framework. Our team uses this framework extensively in on-premise infrastructure testing and during purple team exercises to test security controls.
Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core
Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline. We will also review the best practices for secure
Threat modeling can lead to conflicts between security experts and developers as it's time-consuming and delays releases. Learn how to engage developers in security.
Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation. You’ll look at the
Many large enterprises and government units prefer to run applications in private clouds, and cannot accept SaaS solutions. When catering to these markets, designing your applications for multiple, re
In this webinar, we will cover: - The Importance of DevSecOps - Key DevSecOps Challenges and Barriers to Success - Overcoming DevSecOps Challenges
As prescribed by the new PCI Software Security Framework, learn how to transform policy into actionable tasks for compliance.
When discussing DevSecOps, we need to align DevOps, Compliance, Audit, and Business teams. In this webinar, we will present an approach to transition from DevOps to DevSecOps.