On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit

Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit

According to Gartner, the application layer contains 90% of all vulnerabilities. However, do security experts and developers know what’s happening underneath the application layer? Organizations are aware they cannot afford to let potential system flaws or weaknesses in applications be exploited, but knowing the distinctions between these weaknesses can make ... Read More
May 29, 2018
Veracode
Security at the Speed of Software Development

Security at the Speed of Software Development

There are a lot of DevSecOps offerings that are just DevOps lipstick on a traditional security-as-a-gate pig. Also, security specialists, especially at large organizations, believe that better security comes from robust independent gating. On the other hand, DevOps has proven that you can safely deploy an order of magnitude or ... Read More
May 8, 2018
WhiteSource Software
You Build It, You Secure It: Higher Velocity and Better Security with DevSecOps

You Build It, You Secure It: Higher Velocity and Better Security with DevSecOps

It’s 30 times cheaper to fix a security defect in Development vs. Production, yet Security is often treated as an afterthought and a bottleneck.  It doesn’t have to be that way. DevSecOps practices build security and quality into the software delivery process by making EVERYONE responsible for security at every ... Read More
April 18, 2018
ElectricCloud
RSA 2018- What’s Hot in the Cyber Security Space

RSA 2018- What’s Hot in the Cyber Security Space

Love it or hate, the annual RSA Conference (RSAC) in San Francisco is the largest cyber security conference in world. It is where the world comes to talk and learn security. Inevitably every year at RSAC there are some technologies that become the industry buzzwords and hot buttons. These generally ... Read More
April 2, 2018
Security Boulevard
This Year at RSA: Don’t Miss The Conversation on DevSecOps!

This Year at RSA: Don’t Miss The Conversation on DevSecOps!

The 2018 RSA conference promises to feature a lively, yet critical discussion on the role of DevSecOps and how this movement is transforming the way organizations are building and securing their software.  Many agree that secure software equals good software. As we have seen in so many recent headlines, the ... Read More
March 22, 2018
Veracode
After the Data Breach: Stolen Credentials

After the Data Breach: Stolen Credentials

Credentials don’t start out on the dark web – they end there.  When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of ... Read More
March 7, 2018
Shape Security
Seven Deadly Saves To Security With Integrations

Seven Deadly Saves To Security With Integrations

As software increasingly plays a critical role in how leaders run businesses, we are seeing that organizations want more software produced faster while at the same time protecting themselves against cyber attackers who are finding software a more attractive target to explore. For security professionals, this expanded and more complex ... Read More
March 1, 2018
Veracode
2018 - The Year Ahead in Cybersecurity

2018 – The Year Ahead in Cybersecurity

Once again cybersecurity rose to the top of the news in 2017. Unfortunately, 2018 doesn’t seem to hold any change in news of breaches and security incidents abating. But there are technologies on the horizon that could change the equation. What will 2018 look like from a cyber perspective? We ... Read More
February 22, 2018
Security Boulevard
Implementing Secure DevOps: Challenges and Opportunities

Implementing Secure DevOps: Challenges and Opportunities

Organizations are turning out software faster than ever and recognizing their growing risk exposure to potential cyberattacks. Security teams are working with developers to change their approach and learn to integrate security directly into their process. However, as is often the case with implementing a new system-wide approach, establishing standards ... Read More
February 15, 2018
Veracode
How Machine Learning & AI Will Improve Cyber Security

How Machine Learning & AI Will Improve Cyber Security

Machine Learning (ML) and Artificial Intelligence (AI) have been proclaimed as perhaps the next great leap in human quality of life, as well as a potential reason for our extinction. Somewhere in between lies how ML & AI can potentially improve our Cyber Security efforts. But are ML & AI ... Read More
February 12, 2018
Security Boulevard
Loading...