Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Tigera: AWS Dev Day: Hands-on EKS workshop for K8s security and observability

In this EKS-focused workshop for Kubernetes security and observability by AWS and Tigera, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement.

Tigera: Hands-on workshop to learn security and observability on RKE2 and Calico

In this RKE2-focused workshop for networking, security and observability on containers, Kubernetes and Calico, you will work with a Calico and RKE expert to learn how to design, deploy, and observe security and networking policies in an RKE environment. This 90-minute hands-on lab comes with your own provisioned Calico Cloud environment, designed to provide more complete knowledge on how to implement.

Tigera: New Product Launch: Security for Cloud-native Applications

We are immensely proud to introduce our newest capabilities to secure cloud-native applications. We've spent a lot of time listening to you, our community and customers, to better understand what you need to secure, observe, and troubleshoot your cloud-native applications. Join us for an exciting launch event hosted by our President & CEO Ratan Tipirneni and our VP Business Development & Product Management, Amit Gupta, to learn more about our newest features and capabilities.

Tigera: Identity-aware microsegmentation for zero-trust security for containers, cloud, and Kubernetes

Cloud-native applications take full advantage of the distributed, scalable, flexible nature of the public cloud deployments thus generate a significantly greater percentage of east-west traffic. This shift has created a larger attack surface area and greater potential for free lateral movement within these application infrastructures. Microsegmentation allows security, platform owners, and networking professional to create secure "islands" within their distributed infrastructure and control access to those islands for all types of users, whether they are outsiders, customers, or employees logging in from various locations. It is central to implementing a zero trust security model for cloud-native applications.

Tigera: Microsoft and Tigera: Hands-on AKS workshop for container and Kubernetes security and observability

In this AKS-focused workshop about container and Kubernetes security and observability, you will work with Microsoft and Calico experts to learn how to design, deploy, and observe container and cloud-native networking security in an AKS or Microsoft Azure environment. This 90-minute hands-on lab with your own provisioned AKS and Calico Cloud environment is designed to provide more complete knowledge on how to implement.

Tigera: 4 ways enterprises do container security and cloud-native network security together

As more organizations adopt microservices based architecture runnning on containers for their cloud-native application, it expands the attack surface at build, deploy and run time. A security approach that only relies on detecting image vulnerabilities and misconfigurations is not enough to secure the application. Security, DevOps, SREs, DevSecOps and platform owners not only need the ability to observe, monitor not only these containers for malicious activity at build time but also require runtime security for the application. In this webinar, you will learn how enterprises address both container and cloud-native network security for build, deploy and run-time.

Tigera: AWS Dev Day: Hands-on EKS workshop about cloud-native application security and observability

In this EKS-focused workshop about cloud-native application security and observability, you will work with a Calico and AWS expert to learn how to design, deploy, and observe container security, cloud-native network security, and compliance in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement.

Tigera: Microsoft and Tigera: Hands-on AKS workshop for container and Kubernetes security and observability

In this AKS-focused workshop about container and Kubernetes security and observability, you will work with Microsoft and Calico experts to learn how to design, deploy, and observe container and cloud-native networking security in an AKS or Microsoft Azure environment. This 90-minute hands-on lab with your own provisioned AKS and Calico Cloud environment is designed to provide more complete knowledge on how to implement.

Veracode: New Data Reveals How AppSec Is Adapting to New Development Realities

DevSecOps has moved security front and center in modern development. Yet security and development teams are driven by different metrics, making it challenging to align on objectives. The move to microservices-driven architecture and the use of containers and serverless has shifted the dynamics of how developers build, test, and deploy code. Most security teams lack an understanding of today's application development practices.