Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to Manage a Modern Cyber Security Strategy

Oliver Pinson-Roxburgh has been in cyber security for over 15 years. He is a self-professed security evangelist, and his love of everything cyber makes him one of the most knowledgeable experts in the industry today. This webinar looks into who the prime targets for cyber attacks are, and how to detect and resolve potential threats quickly and efficiently. We have a supporting article on our website, here all viewers will receive free access to our guide “SIEM: Build, Buy or Outsource”. This is Bulletproof’s third webinar of 2019.

Kubernetes & Tigera: Network Policies, Security, and Auditing

Of course, Tigera’s ability to provide Kubernetes pod networking and facilitate service discovery is extremely valuable, but its real superpower is that both Tigera’s commercial offerings and open-source Tigera Calico can implement network security policies inside a Kubernetes cluster.

Meeting PCI DSS Network Security Requirements in Kubernetes Environments

Compliance standards such as PCI DSS have assumed that traditional characteristics and behaviors of the development and delivery model would continue to be constant going forward. With the Container/Kubernetes revolution, that set of assumptions is no longer entirely correct. Attend this webinar and learn about what’s changed, how those changes weaken your compliance and control environment, and what you can do to adjust to the new reality.

How To Extend Firewalls to Kubernetes to Stop Breaking Existing Security Architectures

Security teams use firewalls to secure their production environments, often using a zone-based architecture, and Kubernetes does not deploy well to that architecture. Application teams are launching new business-critical applications on Kubernetes and are aggressively moving to production. A clash is bound to happen.