Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar

Cloud Unfiltered with Ohad Maislish - Infra as Code - Episode 5

Ohad Maislish discussed cloud infrastructure, DevOps, and the evolution of cloud technologies. Ohad shares his journey from a geek interested in infrastructure to founding M0, focusing on how cloud computing is becoming code with tools like Terraform and Pulumi. They discuss the challenges of platform engineering, the importance of infrastructure as code, and the move towards empowering developers with self-service cloud infrastructure. The dialogue also touches on the significance of open-source projects and the impact of Terraform's licensing changes, leading to the creation of OpenTofu.

The IT Hour | App Lifecycle Releases 03.08.24

Josh Roland, Product Manager at JumpCloud tells us about the latest updates to App Lifecycle Management. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.

Cloud Unfiltered with Cory O'Daniel on DevOps vs. Platform Engineering - Episode 4

Cory O'Daniel, CEO of Massdriver discusses his blog series, which contains the article entitled "DevOps is BS!". Find out why he and others are coming to the conclusion that this may be the case. Additionally, Cory discusses the need for a more consolidated approach to DevOps and how platform engineering may be the answer. Find Out: Find out this and more in the latest episode of Cloud Unfiltered.

Enhancing Compliance through Integrated Solutions: A Webinar with err0 & BoxyHQ

​Join us for an exclusive webinar where Deepak Prabhakara from BoxyHQ and Cesar Nicola from Blue Trail Soft (err0) unveil how integrating err0's error management solutions with BoxyHQ's Audit Logs can revolutionize compliance for companies. This free event is a must-attend for those seeking to fortify their compliance and security.

Understand Security Misconfiguration | OWASP Top 10

🔒 Unlocking Secure Software: Understanding Security Misconfiguration 🔒 In this OWASP Top 10 video, we delve into the critical topic of Security Misconfiguration (A05). 🛡️ Security Misconfiguration poses a significant risk in the OWASP Top 10. It occurs when applications or systems are configured with errors, leaving them vulnerable to exploitation by malicious actors. Whether it’s unchanged default settings or outdated software, these misconfigurations can have dire consequences.