On-Demand Webinars

Why DevOps Is Not DevSecOps

Dispel DevSecOps myths, such as: omnipotence of the shift-to-the-left, all-powerful automation, and preeminence of the culture.
Register Now

On-Demand Webinars

Applying Security to the Twelve-Factor App

The Twelve Factor App captured a methodology that developers can apply to build software-as-a-service apps that are both scalable and maintainable in a DevOps world.
Register Now

On-Demand Webinars

Increasing Speed & Risk: How to Secure Third-Party Software Code

Join Joseph Feiman, Chief Strategy Officer at WhiteHat Security, and guest speaker Amy DeMartine from Forrester, for a dive into the market trends for Software Composition Analysis. Register Now

On-Demand Webinars

Mastering the Basics of Web Application Authentication & Authorization Explained

Join us to understand what happens when someone logs into a web application. Mike King, Technical Escalations Engineer for WhiteHat Security, will guide you through common access scenarios and vulnerabilities.

Register Now

On-Demand Webinars

Top 10 Application Security Vulnerabilities for Developers

Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.

Register Now

On-Demand Webinars

Microservices Architecture: Security Trends

The journey to a microservices architecture generally involves the decomposition of an already existing monolithic application, wherein previous security assumptions and considerations are often questioned and sometimes invalidated.

Register Now

On-Demand Webinars

451 Research & WhiteHat: A Brave New World for AppSec

The new year brings fundamental changes to the application security battleground – and with them, new questions that organizations must answer.

Register Now

On-Demand Webinars

Understanding Software Composition Analysis (SCA)

It is challenging to keep up with the number and prevalence of vulnerabilities. Many frequently download third-party components that contain critical vulnerabilities, which can lead to serious exploits and attacks.

Register Now

On-Demand Webinars

Path Traversal: Find and Fix Vulnerabilities

The Path Traversal attack technique (also known as Directory Transversal) allows an attacker to access files, directories, and commands that reside outside the root directory.

REGISTER NOW

On-Demand Webinars

Protect your Website from Cross-Site Scripting Attacks

Cross-site scripting (XSS) is one of the most common web vulnerabilities that can lead to phishing attacks, website defacement, session hijacking, and installation of malware on a victim’s computer.

Register Now

On-Demand Webinars

SQL Injection Attacks

SQL injection attacks enable attackers to tamper with, delete or steal sensitive data from corporate databases. We will discuss SQL injection attacks and how to best defend against them.

Register Now

On-Demand Webinars

Anyone Can Be an App Developer, But How Safe Are Their Apps?

Mobile app development has become an assembly game where almost anyone can build an app. Thanks to low and no code tools like AppMakr and Appypie and cross-platform tools like XAMARIN and PhoneGap, few to no app dev skills are required. For more sophisticated apps built by mobile developers using native languages like Java and SWIFT, often more than half of the code comes from internal component reuse and free or licensed third-party libraries.

Register Now

On-Demand Webinars

2018 Application Security Statistics Report Explained

This year WhiteHat has partnered with strategic partners Coalfire and NowSecure on the 2018 Application Security Statistics Report and analyzed data from more than 20,000 applications to provide a true state of application security report.

Register Now

On-Demand Webinars

Securing Microservices in a DevOps World

Traditional software development processes involve relatively large teams working on a single, monolithic deployment artifact. A microservices architecture, on the other hand, provides a different approach to software development.

Register Now

On-Demand Webinars

Sustained PCI DSS Compliance

Successfully pivot your security program to achieve PCI DSS compliance and minimize risk without sacrificing organizational agility.

Register Now

On-Demand Webinars

DevSecOps in A Mobile World

In this on-demand webinar, learn best practices of mobile security, steps to implement DevSecOps for mobile, and 2 case studies of mobile DevSecOps.

SIGN UP

On-Demand Webinars

Business Logic Assessments

Watch this on-demand webinar to learn the right BLA methodology to uncover hidden and persistent vulnerabilities.

Sign Up

On-Demand Webinars

Java Microservices

Watch this webinar to learn how to apply secure design patterns in Java Microservices.

SIGN UP

On-Demand Webinars

2017 Application Security Statistics Report

In this insightful and data-rich one-hour webinar, WhiteHat Security presents findings from our 2017 State of Application Security Report.

SIGN UP

On-Demand Webinars

DevSecOps Blueprint

This webinar will offer practical information that you can use and provide you with a blueprint for DevSecOps.

SIGN UP

On-Demand Webinars

AppSec Engineers are Unicorns

Join this webinar to understand if your AppSec program is meeting your needs, and how organizations can find talented AppSec Engineers.

SIGN UP

On-Demand Webinars

Secure Coding Practices Part 4: Avoid SQL Injection Attacks

In this webinar, WhiteHat Security discusses SQL attacks and how to best defend against them.

SIGN UP

On-Demand Webinars

Secure Coding Practices Part 3: Avoid Cross-Site Scripting Attacks

In this webinar, WhiteHat Security discusses cross-site-scripting attacks and how to best defend against them.

SIGN UP

On-Demand Webinars

Secure Coding Practices Part 2: Avoid OS Command Injection Attacks

In this webinar, WhiteHat shows you how command injection attacks work and how you can prevent them with real-world examples.

SIGN UP

On-Demand Webinars

Secure Coding Practices Part 1: Avoid Mail Command Injection Attacks

In this webinar, join WhiteHat Security to gain a deeper understanding of common web application vulnerabilities.

SIGN UP

On-Demand Webinars

Path Traversal: The Cause and the Cure

WhiteHat Security has built one of the largest and skilled teams of security experts anywhere on the planet. Join us to gain insight from this team.

LEARN MORE

On-Demand Webinars

Why Business Executives Should Think Like Hackers

The Emerging Threats of Hacking Across the Business Landscape

Learn More

On-Demand Webinars

Web Applications Security Statistics

In this insightful and data-rich one-hour webinar Ryan O’Leary, Vice President of WhiteHat Security’s Threat Research Center and Technical Support, and Tamir Hardof, Chief Marketing Officer, will present findings from our 2016 Web Applications Security Statistics Report.

LEARN MORE