Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Instilling a Higher Level of Trust: Miles & Stockbridge

In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?

Instilling a Higher Level of Trust: Miles & Stockbridge

In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?

Netwrix: Power Up Your Identity & Access Management

To protect your organization's most valuable assets, it's critical to secure all three attack surfaces: data, identities and infrastructure. That puts identity and access management (IAM) squarely at the center of any modern security strategy. Indeed, to build a Zero Trust environment, you need to be able to verify the identities of people, applications and machines, and control what systems and data they can reach.

Tigera: Microsoft Azure: Hands-on AKS workshop: Kubernetes configuration security and compliance

In this AKS-focused security workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment.

Tigera: Hands-on workshop: Implementing observability to secure containers and Kubernetes for EKS

Attend this in-depth, hands-on security workshop with Calico and AWS Dev Days experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

Tigera: Hands-on workshop: Implementing observability to secure containers and Kubernetes for AKS

Attend this in-depth, hands-on security workshop with Calico and Microsoft Azure experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

Tigera: AWS Dev Days: Hands-on EKS workshop: Implementing zero-trust security for containers

In this EKS-focused security workshop, you will work with Calico and AWS Dev Days experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.