Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enabling Secure Kubernetes Multi-Tenancy with Calico Enterprise

When you have different teams interacting with a Kubernetes cluster you need to think about the security, privacy, and observability challenges associated with multi-tenancy: How to provide each team with access to the specific resources they need, in a way that allows the team to be agile, without risking impacting other teams? In this session, we’ll explore the Kubernetes multi tenancy concepts and design patterns needed for successful enablement of multi-tenancy within your Kubernetes clusters using key capabilities of Calico Enterprise.

Secure Your Journey to the Cloud with Tripwire Configuration Manager

Tripwire can help you make your journey to the cloud more secure based on industry standards and best practices like the Center for Internet Security’s 20 CIS Controls. In this presentation, we highlight the cloud capabilities from Tripwire you might not already be aware of. See a guided demo of Tripwire Configuration Manager, and learn about common use cases around issues such as public vs private cloud storage security and multi-cloud compliance.

The Rise of Scalper Bots: An Analysis of the PS5 Launch

Scalper bots, also referred to as sneaker bots, thrive on supply and demand. These malicious bots target merchandise that is in high demand or limited supply and snap it up faster than any human user can, before selling it on for a tidy profit. During our panel discussion, we’ll be delving into the scalper bot challenge facing brands, retailers and customers.

Build and Upload Files to Scan Using Veracode Static for Visual Studio

In this video, you will learn how to prepare a build of your application using Veracode Static for Visual Studio and upload the build to a new or existing application profile in your Veracode portfolio. Veracode Static for Visual Studio integrates with Visual Studio and assists you with compiling and uploading applications for scanning. It also provides quick information about potential security flaws in your applications, enabling remediation directly within your IDE.

See and Secure containers on AWS Fargate

Tune into our #LinkedInLive event on December 9 from 11:30am-12pm PST and join Sysdig and Amazon Web Services (AWS) experts, Pawan Shankar and Eric Carter, to learn how to scan #AWS #Fargate containers in under 4 minutes with Sysdig Secure. Join this live discussion to learn how Sysdig Secure closes the visibility and security gap by providing the first automated #Fargate inline scanning.

Outpost24 Webinar: Mastering container security in modern day DevOps

Join our webinar as our cloud security expert examines the security challenges that come with container adoption and unpack the key steps required to integrate and automate container assessment into the DevOps cycle to help developers build and deploy cloud native apps at speed whilst keeping one eye on security.

Outpost24 webinar - Protecting Cezanne HR's cloud web application with continuous assessment

Cyberattacks like payroll scams and recruitment fraud are finding their way into organizations via HR which makes protecting your employee data just as important as customer data. Find out how Cezanne HR secure their SaaS application with continuous assessment to help their customers protect employee data. The Cezanne HR SaaS application is used by over 650 organizations across the globe to simplify human resource management. But when it comes to sensitive employee data, customers demand proof of security and need to know that their data is in safe hands. In this webinar John Hixon, R&D Director at Cezanne HR, will share in-depth insights into how he leverages manual pen testing and dynamic application security testing throughout the Software Development Lifecycle (SDLC) to uncover hidden risks in the application and protect their customer data. Join our host Simon Roe, Application Security Product Manager, and John as they discuss the importance of data protection in HR, and how this hybrid continuous assessment approach has helped them secure their business critical apps and maintain ISO certification standards at scale.