On-Demand Webinars

New Outcomes for Mastering PSD2 in Banking ON-DEMAND

New Outcomes for Mastering PSD2 in Banking

As part of the Payment Services Directive 2 (PSD2), the European regulation for electronic payment services seeks to make payments more secure in Europe, boost innovation and help banking services adapt to new technologies.

WATCH NOW
Application Security In 2020: Keep Calm And Shift Left ON-DEMAND

Application Security In 2020: Keep Calm And Shift Left

For years, businesses have developed applications to meet customer, partner, and vendor needs, and for years, attackers have taken advantage of application flaws to compromise organizations and put their customers at risk.

WATCH NOW
DevSecOps Framework ON-DEMAND

DevSecOps Framework

Finely-tuned DevOps provides many benefits to an enterprise, including speed of development, improved deployment frequency, lower failure rates of new releases, and faster times to market.

WATCH NOW
Reduce API Security Risks with Automated and Continuous API Scanning ON-DEMAND

Reduce API Security Risks with Automated and Continuous API Scanning

APIs expose application logic and sensitive data such as Personally Identifiable Information (PII), APIs have increasingly become a target for attackers leading to many serious data breaches in recent past.

WATCH NOW
How to Transform AppSec and Move Towards Secure DevOps ON-DEMAND

The DevSecOps Journey: How to Transform AppSec and Move Towards Secure DevOps

Speed to market has been everything in the software development world. But over time we’ve discovered that speed alone cannot remain the end all be all. Security must become part of the software development.

WATCH NOW
The State of Election Security & Voting Systems ON-DEMAND

2020 Election Security: The State of Election Security & Voting Systems

U.S. election security is a top national interest. All national, state, and local election organizations are under immense pressure to secure their voting systems and ensure the integrity of the infrastructure.

WATCH NOW
Detecting and Defending Against Server-Side Request Forgery ON-DEMAND

Detecting and Defending Against Server-Side Request Forgery

This presentation covers characteristics found in functionalities that are commonly susceptible to SSRF attacks.

WATCH NOW
Mobile Security App-titude ON-DEMAND

Mobile Security App-titude: Best Practices for Secure App Design and Data Privacy

Attend this webinar to learn how to prevent mobile app security intrusions and address data privacy challenges.

WATCH NOW
Unbreakable APIs ON-DEMAND

Unbreakable APIs

APIs are doors into your data and applications, so pausing to include security is just as important as securing web applications.

WATCH NOW
Deep-Dive into DevSecOps Framework ON-DEMAND

Deep-Dive into DevSecOps Framework

Join WhiteHat Security’s Chief Scientist, Eric Sheridan, as he discusses the DevSecOps framework from development, build, to deployment.

WATCH NOW
2019 WhiteHat AppSec Stats Report Explained ON-DEMAND

2019 WhiteHat AppSec Stats Report Explained

We look at crucial application security data to derive conclusions, identify trends, and highlight what’s working and what’s not when it comes to DevSecOps and secure application delivery.

WATCH NOW
Why DevOps Is Not DevSecOps ON-DEMAND

Why DevOps Is Not DevSecOps

Dispel DevSecOps myths, such as: omnipotence of the shift-to-the-left, all-powerful automation, and preeminence of the culture.

WATCH NOW
Jump Start Your Application Security in the Cloud ON-DEMAND

Jump Start Your Application Security in the Cloud

New threats emerge as the landscape of the cloud application evolves from more traditional environments.

WATCH NOW
Applying Security to the Twelve-Factor App ON-DEMAND

Applying Security to the Twelve-Factor App

he Twelve Factor App captured a methodology that developers can apply to build software-as-a-service apps that are both scalable and maintainable in a DevOps world.

WATCH NOW
How to Secure Third-Party Software Codes ON-DEMAND

Increasing Speed & Risk: How to Secure Third-Party Software Code

Join Joseph Feiman, Chief Strategy Officer at WhiteHat Security, and guest speaker Amy DeMartine from Forrester, for a dive into the market trends for Software Composition Analysis.

WATCH NOW
Mastering the Basics of Web Application Authentication ON-DEMAND

Mastering the Basics of Web Application Authentication & Authorization Explained

Join us to understand what happens when someone logs into a web application. Mike King, Technical Escalations Engineer for WhiteHat Security, will guide you through common access scenarios and vulnerabilities.

WATCH NOW
Top 10 Application Security Vulnerabilities for Developers ON-DEMAND

Top 10 Application Security Vulnerabilities for Developers

Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.

WATCH NOW
Microservices Architecture: Security Trends ON-DEMAND

Microservices Architecture: Security Trends

The journey to a microservices architecture generally involves the decomposition of an already existing monolithic application, wherein previous security assumptions and considerations are often questioned and sometimes invalidated.

WATCH NOW
A Brave New World for AppSec ON-DEMAND

451 Research & WhiteHat: A Brave New World for AppSec

The new year brings fundamental changes to the application security battleground – and with them, new questions that organizations must answer.

WATCH NOW
Understanding Software Composition Analysis (SCA) ON-DEMAND

Understanding Software Composition Analysis (SCA)

It is challenging to keep up with the number and prevalence of vulnerabilities. Many frequently download third-party components that contain critical vulnerabilities, which can lead to serious exploits and attacks.

WATCH NOW
Find and Fix Vulnerabilities ON-DEMAND

Path Traversal: Find and Fix Vulnerabilities

The Path Traversal attack technique (also known as Directory Transversal) allows an attacker to access files, directories, and commands that reside outside the root directory.

WATCH NOW
Protect your Website from Cross-Site Scripting Attacks ON-DEMAND

Protect your Website from Cross-Site Scripting Attacks

Cross-site scripting (XSS) is one of the most common web vulnerabilities that can lead to phishing attacks, website defacement, session hijacking, and installation of malware on a victim’s computer.

WATCH NOW
SQL Injection Attacks ON-DEMAND

SQL Injection Attacks

SQL injection attacks enable attackers to tamper with, delete or steal sensitive data from corporate databases. We will discuss SQL injection attacks and how to best defend against them.

WATCH NOW
Anyone Can Be an App Developer, But How Safe Are Their Apps? ON-DEMAND

Anyone Can Be an App Developer, But How Safe Are Their Apps?

Mobile app development has become an assembly game where almost anyone can build an app. For more sophisticated apps built by mobile developers using native languages like Java and SWIFT.

WATCH NOW
2018 Application Security Statistics Report Explained ON-DEMAND

2018 Application Security Statistics Report Explained

This year WhiteHat has partnered with strategic partners Coalfire and NowSecure on the 2018 Application Security Statistics Report and analyzed data from more than 20,000 applications to provide a true state of application security report.

WATCH NOW
Securing Microservices in a DevOps World ON-DEMAND

Securing Microservices in a DevOps World

Traditional software development processes involve relatively large teams working on a single, monolithic deployment artifact. A microservices architecture, on the other hand, provides a different approach to software development.

WATCH NOW