BUILDING APPLICATION SECURITY INTO DEVOPS

Security experts believe that application security should be baked into the DevOps framework, but often times, it’s tough to get started. In this discussion, we’ll talk about specific strategies for partnering with developers and DevOps to build security into the software development lifecycle.The benefits of partnering with DevOps and integrating into tools like Continuous Integration (CI) Practical tips for how to build a partnership with developers DevOps Specific ways to begin integrating application security into DevOps CI
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Securing Microsoft Office 365 in the New Normal. Why Now?

With the widespread adoption of Office 365 and an increasingly mobile workforce, cloud security has become top of mind for most organisations. Traditional security solutions, like enabling MFA, are focused point-in-time assessments and offer limited efficacy since attackers can still hijack authenticated sessions to gain access. It’s time for a more modern approach to cloud security.
Watch Now

10 Incredible ways you can be hacked through email and how to stop the bad guys

WorkCast

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Watch Now

Security Operations Automation

Security organizations are overworked and constrained. As more systems and users come online, it becomes more difficult to manage alerts and administer access to sometimes hundreds of applications for thousands of employees.
Watch Now

AWS + Fortanix: New Innovations to Accelerate Cloud Adoption Through Data Security, Privacy, and Compliance

While the GDPR and Schrems II mandates accelerated the need for external key management solutions in Europe, it is clear that these needs are expanding to become global requirements. Other countries and even states are jumping into the fray with clear specifications for safeguarding Personally Identifiable Information (PII). For example, Schrems-II doesn’t allow keys that provide access to the encrypted data, to be hosted outside of the European Economic Area (EEA). Privacy and compliance are calling the shots on the data protection lifecycle.
Watch Now