Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Tigera: Shift-Left Security with Calico RBAC

The rapid adoption of Kubernetes has created an agile attitude toward IT resources. Developers can now easily request the resources that they require in order to innovate better and enable faster iteration of microservice development. Such an environment can be challenging for traditional approaches to security, and a single security team taking sole responsibility for security can be a daunting task that is at odds with the desired agility. In this session, we will demonstrate how to leverage Calico RBAC to achieve shift-left security.

Tigera: Cool Tools for Protecting Your Kubernetes Cluster

Constant vigilance is required to ensure that cloud infrastructure is locked down, and that DevSecOps teams have the right tools for the job. Cloud adds a new dimension and increases an organization's attack surface. Even a classic CVE can become a greater threat when cloud is factored into the equation. Because of its dynamic, ephemeral nature, Kubernetes ads further complexity to the challenge of protecting microservices. To effectively respond to this new security paradigm, it's critical for Kubernetes cloud security teams to have the Kubernetes-native tools needed to deploy security controls and detect and mitigate threats.

Tigera: K8s compromise by latest TTPs

In this webinar we will look at the latest TTPs (Tactics, Techniques and Procedures) used by attackers as of Q1-21 to attack and compromise Kubernetes cluster. Attackers are actively using docker and Kubernetes functionality to compromise your cluster and gain required priviledges. TeamTNT's malware chain, Kinsing and other actors are using cutting edge techniques to compromise, hide, and exploit cloud resources.

Tigera: Hands-on workshop for Kubernetes Security for AWS, Azure and GCP

Deep dive interactive workshop with a Calico expert to educate, influence, and design your next step in Kubernetes security 90-mins hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement - Egress access controls - DNS policies - Flow visualization - Logging - Compliance You will get best practices that you can implement, and getting an understanding of how others in your industry are doing Kubernetes security in AWS, Azure, GCP or Private cloud environment today.

Tigera: Kubernetes Security and Compliance for Regulated Environments

Speed and agility are important-but not at the expense of security. Join Fortinet and Tigera to learn how you can extend the security practices and compliance standards, such as PCI-DSS, SOX and HIPAA of traditional regulated networks to your Kubernetes environments. You will learn how security and compliance can keep pace with the application development lifecycle to help you scale your services faster - without compromising security.

Tigera: How to reduce the attack surface of Docker base images

Vulnerabilities in base images are one of the biggest concerns for container security. Container scanning tools list hundreds of vulnerable Linux libraries, many of which are not needed by your application. Scratch images are one option for reducing vulnerabilities in base images, but building them with a reduced attack surface is not easy. In this webinar, You will learn how to containerize a production application using scratch images and determine its runtime dependencies, containerize them ultimately reducing the attack surface significantly.

Tigera: Hands-on EKS workshop for K8s security and observability

In this EKS-focused workshop for Kubernetes security and observability, you will work with a Calico expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS EKS, and with best practices that you can implement in your own organization.

Tigera: Hands-on workshop for Kubernetes Security

A deep-dive interactive workshop with a Calico expert who will help you to design your next step in Kubernetes security. You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS, Azure, GCP, and private cloud environments, and with best practices that you can implement in your own organization. We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

Tigera: Hands-on EKS workshop for Kubernetes Security and Observability

In this EKS-focused workshop for Kubernetes security and observability, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. - Access controls - DNS policy - Dynamic Service Graph - Compliance and reporting - Observability and troubleshooting You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS EKS, and with best practices that you can implement in your own organization.