Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Tigera: Suse Rancher: Hands-on RKE workshop - Implementing Security and Observability for Containers and Kubernetes

Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security and zero-trust workload security for your containerized workloads running in self-managed Kubernetes on Suse Rancher RKE. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Tigera: Hands-on EKS workshop: Implementing Security and Observability for Containers and Kubernetes

Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security and zero-trust workload security for your containerized workloads running in self-managed Kubernetes on Amazon Web Service (AWS). The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Tigera: Four steps to faster troubleshooting of microservices and containers in a Kubernetes

As enterprises adopt containers and Kubernetes, the growing complexity of workload-to-workload communication along with rapid delivery of applications requires a new approach to visibility when it comes to securing Kubernetes clusters. Service breakdown, performance hotspots, security policy violations and gaps, along with faster troubleshooting and time to resolution, require a Kubernetes-centric approach.

Snyk: DevSecOps Teams: Following 'A Day in the Life'

A day in the life of a DevSecOps team can be full of surprises and challenges alike. Development teams need to ship new features fast while security teams need governance and compliance controls to ensure apps are secure before deployment. Both teams would surely benefit from a streamlined process to allow security at scale without impacting development velocity.

CrowdStrike Unlocks XDR for All EDR Customers and Expands Third-Party Integrations Across All Key Security Domains

CrowdStrike further integrating third-party telemetry from CrowdXDR Alliance partners, which now include Cisco, ForgeRock and Fortinet as new members, and third-party vendors, which now include Microsoft and Palo Alto Networks.