Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Tigera: Hands-on workshop: Cyber Threat Protection Strategies & Tactics for Kubernetes

Due to the ephemeral, dynamic and highly distributed nature of Kubernetes deployments, they are vulnerable to cyber attacks. In this interactive workshop a Kubernetes security expert will help you design how to protect Kubernetes environments from cyber threats. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement.

Tigera: Calico WireGuard Support with Azure CNI

One way Calico is used to secure container workloads in Kubernetes is through Network Policies, which allow you to restrict the flow of traffic to and from trusted sources-but this can leave the traffic itself unprotected. One common solution to this is to encrypt traffic at the application level, but Calico gives you another choice: using Wireguard to encrypt data in transit.

Tigera: Hands-on EKS/AKS workshop for K8s security and observability

In this EKS-focused workshop for Kubernetes security and observability, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement: - Access controls - DNS policy - Dynamic Service Graph

Tigera: Hands-on workshop: Learn best practices to address enterprise security and compliance challenges in Kubernetes

In this enterprise compliance focussed workshop for Kubernetes, you will work with a Calico subject matter expert to learn how to design, deploy, and observe security and networking policies to ensure compliance in your Kubernetes environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement.

Tigera: AWS Dev Day: Hands-on EKS workshop for K8s security and observability

In this EKS-focused workshop for Kubernetes security and observability by AWS and Tigera, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement.

Tigera: Hands-on Workshop: Bringing Kubernetes Networking, Security and Observability to Enterprises

A deep-dive interactive workshop with a Calico expert who will help you to design your next step in Kubernetes security. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

Tigera: Three simple Kube-native ways to address Kubernetes and container networking, security and troubleshooting challenges

With the growth in the Kubernetes environment, teams grapple with various networking, security, and troubleshooting challenges. Join this webinar, to learn the high-level container and Kubernetes networking decision tradeoffs, and best practices for securing, monitoring, and troubleshooting your cloud environment derived from the feedback of hundreds of Calico users.

Tigera: Hands-on Workshop: Learn how to implement Workload access controls for containers & Kubernetes

Without proper security controls, containers and Kubernetes become an ideal target for attackers. In this workshop, a Kubernetes security expert will show you how to design policies to securely and granularly control workload access between Kubernetes clusters and external resources like APIs and applications.

Tigera: Cloud Workload Protection: Access Control Best Practices

Rolling out an application without appropriate access controls can expose the business to multiple risks that include: - Unauthorized access to applications and data - Exposure of sensitive data, such as personally identifiable information (PII) - Non-compliance with corporate and industry regulations - Potential introduction of malware and ransomware

Tigera: Microsoft and Tigera: Hands-on AKS workshop for Containers and Kubernetes security and observability

In this joint Microsoft and Tigera AKS-focused hands-on workshop for containers and Kubernetes security and observability, you will work with Microsoft and Calico experts to learn how to design, deploy, and observe security and networking policies in an AKS or Microsoft Azure environment. This 90-minute hands-on lab with your own provisioned AKS and Calico Cloud environment is designed to provide more complete knowledge.