Hear from Anirban Banerjee, CEO and Co-founder of Riscosity, and Matt Twells, Sr. Solution Architect at Bishop Fox, as they explore critical considerations for developing a security program that prioritizes third-party risk reduction.
Tool Talk: Nuclei
In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.
Application Security: Getting the Most Out of Your Penetration Tests
Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.
2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management
Tune into our webcast to learn more about Attack Surface Management and tips for evaluating solutions. GigaOm analyst Chris Ray joins us to share his insights!
Tool Talks: Debugging Ruby Exploits
In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.
Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business
Uncover your organization’s unique cost savings and risk mitigation strategy for a continuous offensive testing solution with our customized ROI calculation.
Combating Ransomware with an Offensive Roadmap
Examine your organization’s level of ransomware preparedness through the lens of offensive security considerations.
SC Media Special Event: Continuously Hacking Yourself
Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.
Cracking the Code: Secure Code Review in DevSecOps
On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.
The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous
In the hands of skilled attackers, many "low risk" exposures serve as launching pads or steppingstones to more complex and destructive attacks. Join our webcast as we dive into real-world examples.
What Bad Could Happen? Managing Application Risk with Threat Modeling
What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.
Tool Talk: Fuzzing
Get the buzz on fuzz testing in software development.
Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing
On-demand webcast provides an in-depth look at using Continuous Attack Surface Testing (CAST) to identify and close attack windows before it’s too late.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.