Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Wallarm - Addressing CISOs Priorities In 2023: Wallarm API Security Democast

Modern API security needs to be able to protect against modern challenges. Whether you are protecting brand-new APIs or legacy web apps, Wallarm provides key components to secure your business against emerging threats. Join Tim Ebbers, Field CTO, and Stepan Ilyin, Co-Founder, for a demo of the Wallarm platform, to learn more about the key components and recent feature enhancements.

Tigera: Kubernetes Zero Trust: Leveraging Calico's Host Endpoint Policies for Enhanced Security

In this session, we will briefly go over Kubernetes components and their roles. Then, we will delve into the realm of security and examine how the default configurations of these components could be used to attack your environment and how a zero-trust posture can help against the attacks that are targeting your clusters.

Tigera: Introducing Calico Runtime Threat Defense: A comprehensive runtime security solution for containers

Over the last several quarters, our research and development team invested time to create a transformational technology that provides comprehensive runtime protection from both network and container threats. This is an operationally simpler approach without the need to write complex security rules, enabling security teams to focus on essential tasks.

Tigera: Microsoft Azure: Hands-on AKS workshop: Implementing zero-trust security for containers

In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.

Tigera: Microsoft Azure: Hands-on workshop: Implementing container security on AKS

Attend this in-depth, hands-on, AKS-focused security workshop with Microsoft Azure and Calico experts to learn how to prevent, detect, and stop breaches in applications running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

Tigera: AWS Dev Days: Hands-on EKS workshop: Implementing zero-trust security for containers

In this EKS-focused security workshop, you will work with Calico and AWS experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.

How Houston-Based Businesses and Organizations Can Protect Themselves from Data Breaches

Earlier last year, Houston Daily reported that the Houston Health Department had a security breach that leaked around 10,000 COVID-19 patients' data. This caused a panic, and of course, the health department had to respond. At the same time, many businesses and organizations in the area also grew alert about the implications a data breach could have.