[Webinars] Software audits for M&A and secure programming

Bring more value to your M&A clients with software audits, and learn how to build a culture of secure programming in your organization in our new webinars.
The post [Webinars] Software audits for M&A and secure programming appeared first on So… Continue reading [Webinars] Software audits for M&A and secure programming

Q&A: Interactive application security testing (IAST) and Seeker

Do you have questions about IAST? We’ve got answers, explanations, and recommendations. Read our responses to audience questions from our last IAST webinar.
The post Q&A: Interactive application security testing (IAST) and Seeker appeared fi… Continue reading Q&A: Interactive application security testing (IAST) and Seeker

[Webinars] Tech due diligence and AppSec tools for developers

Learn how to manage your software asset risk in tech due diligence, and discover AppSec tools and techniques to enable your developers to build security in.
The post [Webinars] Tech due diligence and AppSec tools for developers appeared first on Softw… Continue reading [Webinars] Tech due diligence and AppSec tools for developers

Ask an expert: How to start and advance your cybersecurity career

The post Ask an expert: How to start and advance your cybersecurity career appeared first on Infosec Resources.
Ask an expert: How to start and advance your cybersecurity career was first posted on…
Go on to the site to read the full article
The post… Continue reading Ask an expert: How to start and advance your cybersecurity career

Webinar: Attack Simulation TTPs: Group Policy and Audit Setting Enumeration with Carlos Perez

Join us Wednesday June 19th at 1PM Eastern Situational awareness is key when one lands access on a target system as part of an attack simulation. Knowing what controls are present and which are likely present allows performance of a proper threat assessment for the access that has been obtained. This information is critical because…

The post Webinar: Attack Simulation TTPs: Group Policy and Audit Setting Enumeration with Carlos Perez appeared first on TrustedSec.

Continue reading Webinar: Attack Simulation TTPs: Group Policy and Audit Setting Enumeration with Carlos Perez

[Webinars] Software security metrics and open source security

Learn how to drive your software security initiative with metrics, and get practical advice for open source security with Red Hat, in our upcoming webinars.
The post [Webinars] Software security metrics and open source security appeared first on Softw… Continue reading [Webinars] Software security metrics and open source security

PenTest+: Everything you need to know about CompTIA’s new certification


The post PenTest+: Everything you need to know about CompTIA’s new certification appeared first on Infosec Resources.
PenTest+: Everything you need to know about CompTIA’s new certification was…
Go on to the site to read the full… Continue reading PenTest+: Everything you need to know about CompTIA’s new certification

Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter

Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world. Continue reading Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter

Webinar: You’ve Been Framed! Using Frameworks to Improve and Defend your Security Program

Join us on Thursday, May 30th at 1pm Eastern The majority of organizations that are in the process of building a security program are starting with a security framework. Frameworks seek to provide a reference for planning but also ensure that an organization can benefit from the learnings and successes of the security community at…

The post Webinar: You’ve Been Framed! Using Frameworks to Improve and Defend your Security Program appeared first on TrustedSec.

Continue reading Webinar: You’ve Been Framed! Using Frameworks to Improve and Defend your Security Program

[Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

In our software compliance webinar, Matan Scharf (Synopsys) explains the hidden security dangers of software standardization. Watch May 30 @ 10 a.m. Eastern.
The post [Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin appeared first… Continue reading [Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin