On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

AppSec Automation: Five Steps to Achieving Developer-First Security

AppSec Automation: Five Steps to Achieving Developer-First Security

Securing software takes teamwork—a unified approach from development through testing and into production. But each team has a distinct set of requirements and workflows that need to align to realize a concerted push for security. And while developers influence risk posture, they are often not trained in or focused on ... Read More
March 14, 2024
Synopsys
Securing Open Source

Securing Open Source

It’s not just small startups that are dependent on open source software—enterprises and even many federal agencies are increasingly relying on open source software and applications. Following an executive order from the Biden administration that requires federal agencies to secure software supply chains, organizations of all sizes are revisiting how ... Read More
March 11, 2024
Security Boulevard
Securing the Future - A Shift from Reactive to Proactive AppSec

Securing the Future – A Shift from Reactive to Proactive AppSec

In 2023, 71% of enterprises admitted their application security (AppSec) programs were reactive — playing catch-up with vulnerability alerts -– while at the same time, applications remain the top target for threat actors. That adds up to increased business risk for a lot of companies and fuels an urgent need ... Read More
February 28, 2024
Mend.io
What the Latest Updates to Cybersecurity Regulations Mean For You

What the Latest Updates to Cybersecurity Regulations Mean For You

In 2023, there were a number of new cybersecurity regulations introduced in the U.S. and the EU designed to protect organizations’ digital assets. But it can be tricky to make sense of all these regulations and ensure you remain in compliance going into 2024. Not to mention the potential for ... Read More
February 27, 2024
Nethawk
Risk and Threat Management Strategies in an Evolving Digital World

Risk and Threat Management Strategies in an Evolving Digital World

As organizations increasingly operate within complex multi-cloud or hybrid environments and embrace cloud-native software architectures, cybersecurity teams’ role becomes more crucial  – and more challenging. Risks grow as attack surfaces expand, cloud and on-premises infrastructure management becomes more complex and new threats relentlessly emerge. Join us for an insightful webinar ... Read More
February 20, 2024
Tenable
Logging's Not Dead: Long Live Logging!

Logging’s Not Dead: Long Live Logging!

If you’re like most companies, you have Cloud Providers, on-premises environments, serverless functions, containerized deployments, and a whole host of integrations between those and more. The operational complexity and increased attack vectors of all these systems, combined with the need for automation, AI, reduced MTTR, and increased uptime, all point ... Read More
February 6, 2024
SentinelOne
Staying Ahead of the Account Takeover Fraud Epidemic: Breakthrough Approaches and Tactics

Staying Ahead of the Account Takeover Fraud Epidemic: Breakthrough Approaches and Tactics

It doesn’t matter which report you read: the data shows account takeover attacks (ATO) have skyrocketed in 2023 – and brand impersonation techniques have become a go-to for the fraudsters fuelling the ATO attack boom. And it’s not just ATO – credit card theft via brand impersonation has also exploded ... Read More
February 5, 2024
Security Boulevard
The Ultimate Guide to Container Security: Tips and Tricks for Success

The Ultimate Guide to Container Security: Tips and Tricks for Success

As containers solidify their role in modern cloud-native IT development, the need for robust security measures is more crucial than ever. Containers’ popularity is growing due to their lightweight flexibility and speed, but those benefits come with tradeoffs: Containerized applications often face inadequate attention when it comes to safeguarding against ... Read More
January 30, 2024
Palo Alto
Transformative Benefits of Automated Dependency Updates for Your Applications

Transformative Benefits of Automated Dependency Updates for Your Applications

Properly managing dependency updates can effectively reduce vulnerabilities by up to 70% and provide access to new features and bug fixes that improve application performance. But too often, teams must manually update dependencies — a tedious and time-consuming process that is often neglected and increases technical debt. Making time to ... Read More
January 17, 2024
Mend
Best Practices to Secure and Protect Modern Software Applications

Best Practices to Secure and Protect Modern Software Applications

In an era where the digital landscape is constantly evolving, application security has become paramount for business success. Please join us as we unveil essential best practices for establishing robust application security programs from our recently released custom survey with TechTarget’s Enterprise Strategy Group. During this program, you will learn: ... Read More
December 19, 2023
Mend