On-Demand Webinars

Virtual Series – Security in the Fast Lane: Securing Our App-Driven Economy

Digital transformation is a social phenomenon that has now touched us all. Applications are the driving force of this new world economy, and security teams are frustrated and overwhelmed as they struggle to keep up. Tune in to gather critical information from industry leaders and application security professionals on what’s most important, where to pivot, and how to thrive in this unpredictable climate.

Register Now

On-Demand Webinars

Accelerate Your AppSec program with Dynamic Application Security Testing (DAST)

How successful are organizations today at deploying and scaling a complete application security program into a modern software development organization?

Register Now

On-Demand Webinars

Application Security In 2020: Keep Calm And Shift Left

For years, businesses have developed applications to meet customer, partner, and vendor needs, and for years, attackers have taken advantage of application flaws to compromise organizations and put their customers at risk.

Register Now

On-Demand Webinars

DevSecOps Framework

Finely-tuned DevOps provides many benefits to an enterprise, including speed of development, improved deployment frequency, better collaboration between Development and Operations teams, lower failure rates of new releases, and faster times to market.

Register Now

On-Demand Webinars

Cybersecurity is a Team Sport

Hear from veteran cybersecurity leader-practitioners about evolving “vendor relationships” into “strategic partner alliances” to succeed at scale.

Register Now

On-Demand Webinars

Reduce API Security Risks with Automated and Continuous API Scanning

Digital businesses have widespread API usage that makes it easier for organizations to share data and integrate with customer applications.

Register Now

On-Demand Webinars

The DevSecOps Journey: How to Transform AppSec and Move Towards Secure DevOps

Speed to market has been everything in the software development world. But over time we’ve discovered that speed alone cannot remain the end all be all. The majority of data breaches have to do with web application security vulnerabilities; and therefore, security must become part of the software development equation.

Register Now

On-Demand Webinars

2020 Election Security: The State of Election Security & Voting Systems

U.S. election security is a top national interest. All national, state, and local election organizations are under immense pressure to secure their voting systems and ensure the integrity of the infrastructure.

Register Now

On-Demand Webinars

Detecting and Defending Against Server-Side Request Forgery

This presentation covers characteristics found in functionalities that are commonly susceptible to SSRF attacks.

Register Now

On-Demand Webinars

Mobile Security App-titude: Best Practices for Secure App Design and Data Privacy

Attend this webinar to learn how to prevent mobile app security intrusions and address data privacy challenges.

Register Now

On-Demand Webinars

Unbreakable APIs

APIs are doors into your data and applications, so pausing to include security is just as important as securing web applications.

Register Now

On-Demand Webinars

Deep-Dive into DevSecOps Framework

Join WhiteHat Security’s Chief Scientist, Eric Sheridan, as he discusses the DevSecOps framework from development, build, to deployment.

Register Now

On-Demand Webinars

2019 WhiteHat AppSec Stats Report Explained

We look at crucial application security data to derive conclusions, identify trends, and highlight what’s working and what’s not when it comes to DevSecOps and secure application delivery.

Register Now

On-Demand Webinars

Why DevOps Is Not DevSecOps

Dispel DevSecOps myths, such as: omnipotence of the shift-to-the-left, all-powerful automation, and preeminence of the culture.

Register Now

On-Demand Webinars

Jump Start Your Application Security in the Cloud

New threats emerge as the landscape of the cloud application evolves from more traditional environments.

Register Now

On-Demand Webinars

Applying Security to the Twelve-Factor App

The Twelve Factor App captured a methodology that developers can apply to build software-as-a-service apps that are both scalable and maintainable in a DevOps world.

Register Now

On-Demand Webinars

Increasing Speed & Risk: How to Secure Third-Party Software Code

Join Joseph Feiman, Chief Strategy Officer at WhiteHat Security, and guest speaker Amy DeMartine from Forrester, for a dive into the market trends for Software Composition Analysis.

Register Now

On-Demand Webinars

Mastering the Basics of Web Application Authentication & Authorization Explained

Join us to understand what happens when someone logs into a web application. Mike King, Technical Escalations Engineer for WhiteHat Security, will guide you through common access scenarios and vulnerabilities.

Register Now

On-Demand Webinars

Top 10 Application Security Vulnerabilities for Developers

Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.

Register Now

On-Demand Webinars

Microservices Architecture: Security Trends

The journey to a microservices architecture generally involves the decomposition of an already existing monolithic application, wherein previous security assumptions and considerations are often questioned and sometimes invalidated.

Register Now

On-Demand Webinars

451 Research & WhiteHat: A Brave New World for AppSec

The new year brings fundamental changes to the application security battleground – and with them, new questions that organizations must answer.

Register Now

On-Demand Webinars

Understanding Software Composition Analysis (SCA)

It is challenging to keep up with the number and prevalence of vulnerabilities. Many frequently download third-party components that contain critical vulnerabilities, which can lead to serious exploits and attacks.

Register Now

On-Demand Webinars

Path Traversal: Find and Fix Vulnerabilities

The Path Traversal attack technique (also known as Directory Transversal) allows an attacker to access files, directories, and commands that reside outside the root directory.

REGISTER NOW

On-Demand Webinars

Protect your Website from Cross-Site Scripting Attacks

Cross-site scripting (XSS) is one of the most common web vulnerabilities that can lead to phishing attacks, website defacement, session hijacking, and installation of malware on a victim’s computer.

Register Now

On-Demand Webinars

SQL Injection Attacks

SQL injection attacks enable attackers to tamper with, delete or steal sensitive data from corporate databases. We will discuss SQL injection attacks and how to best defend against them.

Register Now

On-Demand Webinars

Anyone Can Be an App Developer, But How Safe Are Their Apps?

Mobile app development has become an assembly game where almost anyone can build an app.

Register Now

On-Demand Webinars

2018 Application Security Statistics Report Explained

This year WhiteHat has partnered with strategic partners Coalfire and NowSecure on the 2018 Application Security Statistics Report and analyzed data from more than 20,000 applications to provide a true state of application security report.

Register Now

On-Demand Webinars

Securing Microservices in a DevOps World

Traditional software development processes involve relatively large teams working on a single, monolithic deployment artifact. A microservices architecture, on the other hand, provides a different approach to software development.

Register Now