On Demand Talks Contextual Vulnerability Prioritization & Remediation Across the Attack Surface The Rise of the Cloud-Conscious Adversary Improving Vulnerability Detection and Response Across your Supply Chain Backup betrayal: Why legacy backups are ransomware’s favorite target Lessons From Billions of Breached Records Mimecast Coffee Chat Series- Phishing Race Against Time: What to do when a zero-day attack strikes How a Zero-Day Lasts 365: One year since the Log4j Vulnerability Protect Kubernetes Apps from SQL Injection Five Steps to Mitigate the Risk of Credential Exposure Protect Kubernetes Apps from SQL Injection Cloud Native Attacks: Why Runtime Protection is NOT Optional Explore all talks