Live stream preview

Securing Attack Surfaces with Graph Technologies - Tal Morgenstern, Vulcan Cyber

Techstrong TV Interviews

Up Next in Techstrong TV Interviews

  • PBOM: Illuminating Software Supply Ch...

    SBOM is a critical step for software supply chain security, but it is only the second act in a five-act play. SBOM is a static list of the name, version, license, and any vulnerabilities of open-source components used to develop and build a piece of software. It is important for quality control a...

  • Developer-Led Landscape: Secure Softw...

    Dell Technologies Capital managing director Tyler Jewell released his latest in-depth report on the developer market, “Developer-Led Landscape: Secure Software Supply Chain.” The report includes observations and industry insights from a curated database of 1,500 companies whose products are sold ...

  • AWS Vulnerability: Unveiling the Uniq...

    Or Aspir, head of research for Mitiga, explains how a vulnerability found in Amazon Web Services (AWS) environments is the latest example of what makes cybersecurity in the cloud so fundamentally different.