On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

The Ultimate Guide to Container Security: Tips and Tricks for Success

The Ultimate Guide to Container Security: Tips and Tricks for Success

As containers solidify their role in modern cloud-native IT development, the need for robust security measures is more crucial than ever. Containers’ popularity is growing due to their lightweight flexibility and speed, but those benefits come with tradeoffs: Containerized applications often face inadequate attention when it comes to safeguarding against ... Read More
January 30, 2024
Palo Alto
Transformative Benefits of Automated Dependency Updates for Your Applications

Transformative Benefits of Automated Dependency Updates for Your Applications

Properly managing dependency updates can effectively reduce vulnerabilities by up to 70% and provide access to new features and bug fixes that improve application performance. But too often, teams must manually update dependencies — a tedious and time-consuming process that is often neglected and increases technical debt. Making time to ... Read More
January 17, 2024
Mend
Best Practices to Secure and Protect Modern Software Applications

Best Practices to Secure and Protect Modern Software Applications

In an era where the digital landscape is constantly evolving, application security has become paramount for business success. Please join us as we unveil essential best practices for establishing robust application security programs from our recently released custom survey with TechTarget’s Enterprise Strategy Group. During this program, you will learn: ... Read More
December 19, 2023
Mend
AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp

AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp

As teams leverage infrastructure-as-code (IaC) at scale on AWS, ops and platform teams are tasked with implementing provisioning standards to prevent security breaches, non-compliance or provisioning practices that drive cloud waste. With a developer-friendly approach to IaC security, operators are able to gain early visibility into possible security issues to ... Read More
December 14, 2023
AWS | Snyk
API Security

API Security

As more APIs are deployed and invoked, the number of cybersecurity incidents involving these endpoints is starting to rise. Cybercriminals now realize APIs are not only vulnerable; they also make it simpler than ever to exfiltrate data that can then be sold on the dark web. API security is now ... Read More
December 11, 2023
Security Boulevard
How Boundless Software Accelerated Customer Onboarding With Calico Cloud and Amazon EKS

How Boundless Software Accelerated Customer Onboarding With Calico Cloud and Amazon EKS

Boundless Software used Calico Cloud and Amazon Elastic Kubernetes Service (EKS) to streamline their infrastructure operations and services, achieve SOC 2 compliance and build out their scalable Switchblade architecture. This significantly reduced customer onboarding times from months to merely hours, saving up to $80,000 per customer, depending on their infrastructure ... Read More
December 11, 2023
Tigera
Building Resilient Organizations Around IT and Cybersecurity

Building Resilient Organizations Around IT and Cybersecurity

Today’s business environment is characterized by volatility, uncertainty, complexity and ambiguity. Resilience doesn’t just mean survival—it means fostering the ability to innovate faster, adapt and grow despite disruptions in the current business environment. Understanding how resilient organizations can continue to adapt and thrive despite the current business environment and keep ... Read More
November 29, 2023
Splunk
ASM/VM/CAASM

ASM/VM/CAASM

Attack surfaces have expanded dramatically in the past few years, with more assets and more vulnerabilities added each and every day. Cybersecurity teams need to take a hard look at their internal and external attack surfaces, as well as their vulnerability management practices, to ensure the long-term security of their ... Read More
November 20, 2023
Security Boulevard
Protecting Your Software Supply Chain From Code to Cloud on AWS

Protecting Your Software Supply Chain From Code to Cloud on AWS

Trusted software supply chain (SSC) security starts at the beginning of the software development life cycle, before a package even enters your systems. Millions of developers from startups to the Fortune 100 turn to open source software (OSS), but this can create unwanted risk and compliance violations from untrusted OSS ... Read More
November 9, 2023
JFrog
Fortifying Digital Defense: Thriving Amidst Emerging Cybersecurity Threats

Fortifying Digital Defense: Thriving Amidst Emerging Cybersecurity Threats

Defending against tomorrow’s cybersecurity threats requires starting to prepare your defenses today. As the threat landscape evolves, your strategy must evolve and adapt to identify the threats and attack vectors that pose the biggest risk to your digital ecosystems. In this Techstrong Learning Experience, you’ll learn about proactive defense measures ... Read More
November 8, 2023
Kasada