On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

Managing Security Posture and Entitlements in the Cloud

Managing Security Posture and Entitlements in the Cloud

Federating access and ensuring compliance across multi-cloud and hybrid environments is a challenge. This is especially true without proper visibility and processes in place to understand what’s being deployed and how to maintain least-privilege access. Credentials are the number-one attack vector in the cloud, and threat actors are increasingly using ... Read More
October 19, 2023
Tenable
Live Workshop on 'SCA 2.0': Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

Picture this: Your application is composed of 12 Docker containers. Together, they have 400 packages. Your SCA scan detects 120 critical and high vulnerabilities. Your dev team doesn’t have the cycles to fix all of them in time. How do you identify which vulnerabilities truly represent higher risk? In this ... Read More
October 18, 2023
Deepfactor
Securing Cloud-Native Applications Across the Software Development Life Cycle

Securing Cloud-Native Applications Across the Software Development Life Cycle

Cloud-native applications open a new frontier for application risk from multiple sources. Risk reduction approaches for cloud-native applications need to take a holistic approach to the software development lifecycle to be effective. In this webinar you will learn: Why this involves finding and remediating risks as they are introduced, from ... Read More
October 17, 2023
Mend | AWS
Shadow Access: Where IAM Meets Cloud Security

Shadow Access: Where IAM Meets Cloud Security

Cloud, application data, AI, and third-party access are growing concerns that create identity and access management (IAM) blind spots. These cloud IAM blind spots represent an ever-expanding threat vector to cloud security, enabling unmonitored, unauthorized ‘shadow access’ and the potential for data exposure. Cloud security and cloud operations teams need ... Read More
October 16, 2023
Stack Identity
ASPM: Leveling the AppSec Playing Field

ASPM: Leveling the AppSec Playing Field

Modern applications are more complex, interconnected, and distributed than ever—and they’re changing at breakneck speed. To keep up, AppSec teams rely on disparate tools (SAST, SCA, DAST, container, IaC security, etc.) and processes (security questionnaires, pen tests, threat models, etc.) that are incredibly time-consuming, noisy, and still leave gaps. Application ... Read More
October 11, 2023
Apiiro
Way Too Vulnerable: Uncovering the State of the Identity Attack Surface

Way Too Vulnerable: Uncovering the State of the Identity Attack Surface

Organizations today rely on digital assets to conduct business, but identity threats have become a critical risk factor. As attackers relentlessly seek to compromise user identities for malicious access, it’s become increasingly apparent there are serious gaps in the tools organizations use to protect themselves. Silverfort commissioned an extensive study ... Read More
October 3, 2023
Silverfort
A Guide to Smart Dependency Management

A Guide to Smart Dependency Management

Dependencies play an important role in the software development life cycle. The use of pre-built, often third-party components are used at various stages such as development, execution and testing. These software dependencies offer several benefits for software developers. They help devs deliver software quickly by providing pre-built functionality and extend ... Read More
September 28, 2023
JFrog
Cloud Security

Cloud Security

It’s been more than 10 years since workloads initially began to be deployed on cloud computing platforms and organizations are still struggling to come to terms with cloud security. IT organizations are now trying to apply guardrails that enable applications to be deployed securely without slowing down the pace at ... Read More
September 25, 2023
Security Boulevard
Cloud Security Turbocharged: A Wild Ride of Innovation, Threats and Staying Ahead

Cloud Security Turbocharged: A Wild Ride of Innovation, Threats and Staying Ahead

Buckle up for a thrilling journey through the fast-paced world of cloud security! As innovation and threats zoom ahead at breakneck speeds, old-fashioned approaches are left eating the dust. Organizations are struggling to prioritize the most critical risks in their environments while maintaining a strong security posture. While the notion ... Read More
September 22, 2023
Sysdig
What AI Doesn't Know About Kubernetes in Production

What AI Doesn’t Know About Kubernetes in Production

https://webinars.securityboulevard.com/what-ai-doesnt-know-about-kubernetes-inhttps://webinars.securityboulevard.com/what-ai-doesnt-know-about-kubernetes-in-production-production As artificial intelligence continues to permeate various industries, it seems logical to incorporate it into our production operations. However, as Eldad Assis, a senior DevOps architect at JFrog, discovered, there are still many aspects of running production-grade Kubernetes that AI like ChatGPT, Google Bard and others are not yet ... Read More
September 21, 2023
JFrog