On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

What the Latest Updates to Cybersecurity Regulations Mean For You

What the Latest Updates to Cybersecurity Regulations Mean For You

In 2023, there were a number of new cybersecurity regulations introduced in the U.S. and the EU designed to protect organizations’ digital assets. But it can be tricky to make sense of all these regulations and ensure you remain in compliance going into 2024. Not to mention the potential for ... Read More
February 27, 2024
Nethawk
Risk and Threat Management Strategies in an Evolving Digital World

Risk and Threat Management Strategies in an Evolving Digital World

As organizations increasingly operate within complex multi-cloud or hybrid environments and embrace cloud-native software architectures, cybersecurity teams’ role becomes more crucial  – and more challenging. Risks grow as attack surfaces expand, cloud and on-premises infrastructure management becomes more complex and new threats relentlessly emerge. Join us for an insightful webinar ... Read More
February 20, 2024
Tenable
Logging's Not Dead: Long Live Logging!

Logging’s Not Dead: Long Live Logging!

If you’re like most companies, you have Cloud Providers, on-premises environments, serverless functions, containerized deployments, and a whole host of integrations between those and more. The operational complexity and increased attack vectors of all these systems, combined with the need for automation, AI, reduced MTTR, and increased uptime, all point ... Read More
February 6, 2024
SentinelOne
Staying Ahead of the Account Takeover Fraud Epidemic: Breakthrough Approaches and Tactics

Staying Ahead of the Account Takeover Fraud Epidemic: Breakthrough Approaches and Tactics

It doesn’t matter which report you read: the data shows account takeover attacks (ATO) have skyrocketed in 2023 – and brand impersonation techniques have become a go-to for the fraudsters fuelling the ATO attack boom. And it’s not just ATO – credit card theft via brand impersonation has also exploded ... Read More
February 5, 2024
Security Boulevard
The Ultimate Guide to Container Security: Tips and Tricks for Success

The Ultimate Guide to Container Security: Tips and Tricks for Success

As containers solidify their role in modern cloud-native IT development, the need for robust security measures is more crucial than ever. Containers’ popularity is growing due to their lightweight flexibility and speed, but those benefits come with tradeoffs: Containerized applications often face inadequate attention when it comes to safeguarding against ... Read More
January 30, 2024
Palo Alto
Transformative Benefits of Automated Dependency Updates for Your Applications

Transformative Benefits of Automated Dependency Updates for Your Applications

Properly managing dependency updates can effectively reduce vulnerabilities by up to 70% and provide access to new features and bug fixes that improve application performance. But too often, teams must manually update dependencies — a tedious and time-consuming process that is often neglected and increases technical debt. Making time to ... Read More
January 17, 2024
Mend
Best Practices to Secure and Protect Modern Software Applications

Best Practices to Secure and Protect Modern Software Applications

In an era where the digital landscape is constantly evolving, application security has become paramount for business success. Please join us as we unveil essential best practices for establishing robust application security programs from our recently released custom survey with TechTarget’s Enterprise Strategy Group. During this program, you will learn: ... Read More
December 19, 2023
Mend
AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp

AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp

As teams leverage infrastructure-as-code (IaC) at scale on AWS, ops and platform teams are tasked with implementing provisioning standards to prevent security breaches, non-compliance or provisioning practices that drive cloud waste. With a developer-friendly approach to IaC security, operators are able to gain early visibility into possible security issues to ... Read More
December 14, 2023
AWS | Snyk
API Security

API Security

As more APIs are deployed and invoked, the number of cybersecurity incidents involving these endpoints is starting to rise. Cybercriminals now realize APIs are not only vulnerable; they also make it simpler than ever to exfiltrate data that can then be sold on the dark web. API security is now ... Read More
December 11, 2023
Security Boulevard
How Boundless Software Accelerated Customer Onboarding With Calico Cloud and Amazon EKS

How Boundless Software Accelerated Customer Onboarding With Calico Cloud and Amazon EKS

Boundless Software used Calico Cloud and Amazon Elastic Kubernetes Service (EKS) to streamline their infrastructure operations and services, achieve SOC 2 compliance and build out their scalable Switchblade architecture. This significantly reduced customer onboarding times from months to merely hours, saving up to $80,000 per customer, depending on their infrastructure ... Read More
December 11, 2023
Tigera

Application Security Check Up