Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft's AI Experiment Gone Wrong: The Rise and Fall of 'Emily' - From Innovation to Controversy

In this eye-opening video, we delve into the intriguing story of Microsoft's AI experiment, affectionately known as 'Emily,' and its transformation from an innovative creation to a controversial internet sensation. Just a few years ago, Microsoft introduced 'Emily' to the world, a cutting-edge AI designed to interact with and learn from internet users. However, the results were far from what anyone expected.

Release Fast and Secure or Die!

Repetitive tasks are the antithesis of speed. The only way to deliver software rapidly, securely and with quality is to automate software packages across the software supply chain to drive enhanced testing, improve decision-making, eliminate bottlenecks and holistically manage your software resources. Join Yossi Shaul, SVP of R&D, JFrog, and Gali Zisman, VP of Product, JFrog, to explore JFrog’s new release-first approach, including exclusive swampUP announcements, first-time demonstrations & key product advancements!

Shielding the Foundation: Security Across Your SSC

Developers are now the target of the attacker, with binaries available publicly. While it's unlikely that the concept of security point solutions will completely disappear, it’s clear that the market is demanding a consolidated, comprehensive approach to pipeline security across the attack surface. With the increasing complexity of software supply chains, security and governance are becoming critical on developer’s machines, at the C-level and in boardrooms. In this session, Eyal Dyment, VP of Security Product for JFrog, details how next-gen software supply chain solutions must incorporate robust, holistic security or risk being the next tool to be consolidated.

European Security is More Than Regulation: Splunk's 2023 CISO Report

The role of today’s Chief Information Security Officers (CISOs) is complex and rapidly changing. 86% say that the role has changed so much since they became a CISO that it’s almost a different job. They are emerging as strategists and leaders who have a louder voice in the boardroom.

CISO Panel Discussion on Application Security

In this CISO panel discussion, join Kiran Belsekar, EVP – CISO & IT governance, Aegon Life, Manoj Srivastava, CISO, Future Generali and Ashish Tandon, Founder and CEO, Indusface. They cover a variety of topics including: Top challenges facing the office of the CISO Alert fatigue and steps to reduce it Top threat vectors faced by the insurance industry in India The rising threat of LLMs API security and best practices to secure APIs Fighting the perception battle and positioning security teams as business enablers Cutting through vendor noise and picking the right tech stack.

Get More Out of Mend.io with Repository Integrations

How do you build a successful AppSec program? Today, we’re focusing on an area where we have great evidence for a specific best practice – Repository Integration. Choosing where to deploy SCA scans can have a major impact on the success of your AppSec program. You can boost the value of Mend SCA by scanning in your repositories, and we want to show you how!

Mend.io Customer Success Story - WTW

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks. With a proven track record of successfully meeting complex and large-scale application security needs, Mend.io is the go-to technology for the world’s most demanding development and security teams. The company has more than 1,000 customers, including 25 percent of the Fortune 100, and manages Renovate, the open source automated dependency update project.

Bring Your GRC to New Heights: 3 Metrics Every Security Team Should Track

Leading a security team can sometimes feel like you’re being asked to climb a mountain—without any equipment. There’s a lot on the line. You’re trying to stay on the right path, avoid obstacles, and report back your progress to someone who doesn’t even understand what mountain range you’re in. In other words, it’s a climb filled with frustrations and obstacles. We're here to equip you with the tools you need to conquer this security peak.

Are Managed SASE Offerings the Wave of the Future? A Roundtable Discussion with GSI's & SP's

Organizations quickly adapted when they needed to suddenly support hybrid and remote workforces, often in inefficient and unsustainable ways. New technologies and new managed services can now help companies realize the full potential of SASE. In this roundtable discussion, you'll hear leading System Integrators and Service Providers talk about their clients’ top challenges and use cases, how that’s changed over the past three years, and where they see networking and security evolving over the coming years.