[Webinars] Tech due diligence, IAST, and government software

Learn about web services and APIs in tech due diligence, the magic of IAST, and software risks for DoD and government agencies in our upcoming webinars.
The post [Webinars] Tech due diligence, IAST, and government software appeared first on Software I… Continue reading [Webinars] Tech due diligence, IAST, and government software

[Webinar] Deploy Containers Confidently With Synopsys and Google

In our BinAuthz webinar, Sandra Guo (Google) and Tomas Gonzalez (Synopsys) explain Black Duck’s role in the software signing process. Live May 16 @ noon ET.
The post [Webinar] Deploy Containers Confidently With Synopsys and Google appeared first… Continue reading [Webinar] Deploy Containers Confidently With Synopsys and Google

If your employees aren’t learning from your security training, are you really teaching?

The post If your employees aren’t learning from your security training, are you really teaching? appeared first on Infosec Resources.
If your employees aren’t learning from your security training,…
Go on to the site to read the full artic… Continue reading If your employees aren’t learning from your security training, are you really teaching?

[Webinar] 2019 Open Source Security Report: Persistent Challenges and Forward Progress

In our 2019 OSSRA webinar, Tim Mackey discusses trends in open source usage and risk management from the latest OSSRA report. Watch live May 9 @ 12 p.m. ET.
The post [Webinar] 2019 Open Source Security Report: Persistent Challenges and Forward Progres… Continue reading [Webinar] 2019 Open Source Security Report: Persistent Challenges and Forward Progress

Webinar: Compliance in the Cloud

Join us on May 15th, 2019, AT 1:00 PM EST A growing trend. Using cloud service providers has been an increasing trend over the years as most companies are leveraging their services to streamline their infrastructure needs. As this trend grows, many security professionals struggle to effectively layer the organization’s compliance obligations into these environments….

The post Webinar: Compliance in the Cloud appeared first on TrustedSec.

Continue reading Webinar: Compliance in the Cloud

Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats

Experts from Gartner, Lookout and Google talk enterprise mobile security in this webinar replay. Continue reading Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats

Simulating a Cyber Attack: Table-Top Best Practices

JOIN TRUSTEDSEC ON March 27th, 2019 AT 1:00 PM EST Practice? We’re talking about practice?! Cyber attacks are an organizational concern. In order to build an effective security program, it’s impossible to rely on “best practice” policies without testing and vetting them to see if they work. Penetration tests will only go so far and…

The post Simulating a Cyber Attack: Table-Top Best Practices appeared first on TrustedSec.

Continue reading Simulating a Cyber Attack: Table-Top Best Practices