On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

What AI Doesn't Know About Kubernetes in Production

What AI Doesn’t Know About Kubernetes in Production

As artificial intelligence continues to permeate various industries, it seems logical to incorporate it into our production operations. However, as Eldad Assis, a senior DevOps architect at JFrog, discovered, there are still many aspects of running production-grade Kubernetes that AI like ChatGPT, Google Bard and others are not yet familiar ... Read More
March 28, 2024
JFrog
Unlocking the Power of Enterprise Security Data

Unlocking the Power of Enterprise Security Data

Managing and using the vast amount of security data across the enterprise is more complex and crucial than ever. Organizations are drowning in petabytes of data from myriad sources, each with its unique format and schema. Efficiently integrating, managing and leveraging this information is a monumental task. Security teams grapple ... Read More
March 26, 2024
DataBee from Comcast Technology Solutions
The Evolution of 'Shift Everywhere'

The Evolution of ‘Shift Everywhere’

A few years ago, “shift left” was expanded to include a broader testing philosophy in which designs and other development artifacts were also tested as soon as they were ready—this was the beginning of “shift everywhere.” Today, firms are embracing the culture of shift everywhere in the software development pipeline, ... Read More
March 21, 2024
Synopsys
AppSec Automation: Five Steps to Achieving Developer-First Security

AppSec Automation: Five Steps to Achieving Developer-First Security

Securing software takes teamwork—a unified approach from development through testing and into production. But each team has a distinct set of requirements and workflows that need to align to realize a concerted push for security. And while developers influence risk posture, they are often not trained in or focused on ... Read More
March 14, 2024
Synopsys
Securing Open Source

Securing Open Source

It’s not just small startups that are dependent on open source software—enterprises and even many federal agencies are increasingly relying on open source software and applications. Following an executive order from the Biden administration that requires federal agencies to secure software supply chains, organizations of all sizes are revisiting how ... Read More
March 11, 2024
Security Boulevard
Securing the Future - A Shift from Reactive to Proactive AppSec

Securing the Future – A Shift from Reactive to Proactive AppSec

In 2023, 71% of enterprises admitted their application security (AppSec) programs were reactive — playing catch-up with vulnerability alerts -– while at the same time, applications remain the top target for threat actors. That adds up to increased business risk for a lot of companies and fuels an urgent need ... Read More
February 28, 2024
Mend.io
What the Latest Updates to Cybersecurity Regulations Mean For You

What the Latest Updates to Cybersecurity Regulations Mean For You

In 2023, there were a number of new cybersecurity regulations introduced in the U.S. and the EU designed to protect organizations’ digital assets. But it can be tricky to make sense of all these regulations and ensure you remain in compliance going into 2024. Not to mention the potential for ... Read More
February 27, 2024
Nethawk
Risk and Threat Management Strategies in an Evolving Digital World

Risk and Threat Management Strategies in an Evolving Digital World

As organizations increasingly operate within complex multi-cloud or hybrid environments and embrace cloud-native software architectures, cybersecurity teams’ role becomes more crucial  – and more challenging. Risks grow as attack surfaces expand, cloud and on-premises infrastructure management becomes more complex and new threats relentlessly emerge. Join us for an insightful webinar ... Read More
February 20, 2024
Tenable
Logging's Not Dead: Long Live Logging!

Logging’s Not Dead: Long Live Logging!

If you’re like most companies, you have Cloud Providers, on-premises environments, serverless functions, containerized deployments, and a whole host of integrations between those and more. The operational complexity and increased attack vectors of all these systems, combined with the need for automation, AI, reduced MTTR, and increased uptime, all point ... Read More
February 6, 2024
SentinelOne
Staying Ahead of the Account Takeover Fraud Epidemic: Breakthrough Approaches and Tactics

Staying Ahead of the Account Takeover Fraud Epidemic: Breakthrough Approaches and Tactics

It doesn’t matter which report you read: the data shows account takeover attacks (ATO) have skyrocketed in 2023 – and brand impersonation techniques have become a go-to for the fraudsters fuelling the ATO attack boom. And it’s not just ATO – credit card theft via brand impersonation has also exploded ... Read More
February 5, 2024
Security Boulevard