What is Reinforcement Learning (RL)? Definition, Algorithms, Examples
New software code is released almost as fast as new ideas are conceived in the tech industry. This makes web applications some of the most vulnerable places online, as these are exposed to the online world and easily targeted. The solution? Supporting technology.
In the previous episode, Bob Tarzey spoke to Rapid7’s Ben Glass and Jay Paz, Manager of Enterprise Security Consulting and Director of Testing and Consultant Development, respectively, about building better code to stay secure. In this second podcast Bob, Jay and Ben look at some of the supporting technology to avoid vulnerability in companies. This includes the testing of code before releasing it, the testing of deployed software, and finding safer guides to build better and stronger software.
Join 34,209 IT professionals who already have a head start
Meet the panel
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
Fivetran: The Biggest Challenges Facing Data Leaders Today - And How to Solve Them
Informatica: Harnessing Data, AI and Cloud for a 360-Degree View of your Business
Zero Networks: Reinventing Identity Security
Fivetran: Modern Data Leader’s Guide to Improved Customer Outcomes
Radware: 360 Application Protection and Why Companies Need It
HID Global: Choosing the Right Visitor Management Solution
Huntress: Doing More With Less in Your Cybersecurity Strategy
Savvy: SaaS Identity Discovery and Visibility
Sifflet: Data Observability 101