Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Chris Farris - Unblurring The Lines In Cloud Security

00:00 Intro: welcome Chris!

03:05 Trends in cloud security, reflected at fwd:cloudsec

05:00 fwd:cloudsec submissions - more practitioners needed!

10:40 Blurring the lines: what does that practically means?

19:30 Cloud service providers maturity: their security posture evolved

24:30 Public Cloud Security Breaches

30:01 Public Cloud Security Breaches demo

32:35 the Last Pass attack deep dive

38:00 Identify the crown jewels!

Container Security Fundamentals - Linux namespaces part 1: The mount namespace

One of the technologies used by Linux containers to provide an isolated environment, is namespaces. They are used to provide a contained process with an isolated view of different Linux resources. In this video we look at some of the details of how Linux namespaces work and then take a more detailed look at the mount namespace which isolates a processes' view of its filesystem.

Resource Catalog

Resource Catalog provides visibility and security context directly to DevOps in the same platform they are already using every day to monitor their infrastructure. As a result, DevOps teams no longer have to react to a laundry list of security threats. Instead, they are armed with the insight to vigilantly detect security misconfigurations and reduce the mean time to remediation so that their security posture is strengthened.

Leveraging Security Asset Inventories

Asset inventories enable you to know what you have to secure, and to monitor it for deviations. The pace of iteration in the world of software engineering makes those platforms inevitable. In this episode we welcome Sacha Faust, director of security engineering at Grammarly, who built Cartography, one of the first open source asset inventory. Sacha describes what led them to building this (funnily: an offensive use case!), how inventories enable spreading ownership to software teams, the solution that exist off the shelf today, …

Application Vulnerability Management demo

Application Vulnerability Management provides continuous, real-time vulnerability detection across applications in production. See how you can use Application Vulnerability Management to identify, prioritize, and resolve high-impact vulnerabilities exposed in production, without any performance overhead.

Risk Management is a Team Sport with Emilio Escobar

Datadog's Chief Information Security Officer, Emilio Escobar, discusses how organizations are reducing silos between devops and security teams in order to effectively manage security risks. In order to provide secure defaults, decentralized security, and rapid response to security events with deep context, Datadog embeds security at all different levels and scales its program by utilizing security ambassadors and engineers.