Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Conference

Exploring intrusion detection techniques in cloud native environments - Garwood Pang, Tigera

As more production workloads migrated to the cloud, the need for Intrusion Detection Systems(IDS) grew to meet compliance and security needs. With the number of workloads in each cluster, IDS needs to be efficient to not take up the shared resources. Techniques such as packet inspection and web application firewalls provide a solid defense against threats and by leveraging the cluster's network control pane, we are able to selectively choose vulnerable workloads and provide an easy way to trace back to the origin of the attack.

Beyond the network: Next Generation Security and Observability with eBPF - Shaun Crampton, Tigera

Learn how eBPF will bring a richer picture of what's going on in your cluster, without changing your applications. With eBPF we can safely collect information from deep within your applications, wherever they interact with the kernel. For example, collecting detailed socket statistics to root-cause network issues, or pinpointing the precise binary inside a container that made a particular request for your audit trail. This allows for insights into the behavior (and security) of the system that previously would have needed every process to be (manually) instrumented.

Keynote by Bojan Simic, DEJ | AIOps Virtual Conference | CloudFabrix

The AI market is projected to reach a $3 trillion mark by 2024, and machine learning, which is a big part of AI, is the key driver of that growth. Machine learning can augment human understanding in processing large and complex datasets that are typical in IT operations. With rapid advancements in AI/ML technologies, enterprise leaders are beginning to take big bets on AI.

Egress Human Layer Security Global 2021 on demand

The way we work has fundamentally changed. As business leaders and organisations look ahead to a post-pandemic workplace, one thing is clear: it will be highly flexible and mobile. Join Human Layer Security Global to hear from industry thought leaders and top brands about how this changes insider risk and what you need to do to keep sensitive data secure now and for the future.

Hack my misconfigured Kubernetes at Kubecon Europe

In the last few years, we’ve seen more and more responsibilities shift left – to development teams. With the widespread adoption of Kubernetes, we’re now seeing configurations become a developer issue first and foremost. This responsibility means that developers need to be aware of the security risks involved in their configurations.

The State of Infrastructure as Code Security at Kubecon Europe

The adoption of infrastructure-as-code and configuration-as-code is soaring with the rising popularity of technologies like Kubernetes and Terraform. This means that designing and deploying infrastructure is a developer task, even if your “developer” is an infrastructure architect, and, just like application code, configurations can use test-driven methodologies to automate security prior to deployment.