Skip to main content
1 - 5 of 5 results
Items per page:
Technology Showcase Session This session will discuss how modern website architecture has presented an expansive and lucrative attack surface for hackers. Inci...
The intent of the session would be to call out specifics around the process and technology that could be adopted to detect advanced threats and to respond to th...
The advent of the cloud has intensified the threat landscape requiring security professionals to not just explain, but to prove their organizations’ level of co...
APIs, Containers, automated pipelines, and DevOps - oh my! Software delivery is changing, and the risks and audit considerations are changing too. You'll hear a...
As with many types of abuse, DNS plays a pivotal role in the enablement of phishing. We explore a way to find phishing domains with open source intel, without h...
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.