57:06OASIS Data Provenance Standards Building Trust and Transparency in the Age of AIOASIS Open127 views·2 months ago
2:14Introduction to the OASIS Data Provenance Standards Technical CommitteeOASIS Open165 views·1 year ago
53:49OASIS Unveils CACAO v2.0 Webinar Revolutionizing Cybersecurity Playbooks for Enhanced DefenseOASIS Open725 views·2 years ago
59:01Using CSAF to Respond to Supply Chain Vulnerabilities at Large ScaleOASIS Open2.7K views·3 years ago
56:12Using TOSCA, Unfurl, and GitOps to simplify application deploymentOASIS Open907 views·4 years ago
31:55Open Matters Cybersecurity & Intersectional Risk Why Should We CareOASIS Open87 views·4 years ago
1:00:29Visualizing TOSCA Service Templates with Cloudnet TOSCA ToolboxOASIS Open872 views·4 years ago
29:58Strategic Threat Intelligence Preparing for the Next “SolarWinds” EventOASIS Open221 views·4 years ago
54:22Why Cybersecurity SMEs and Service Providers Are Investing in Open Source EffortsOASIS Open68 views·4 years ago