Insights, updates and latest news on container security.
With containers being the next major disruption in application technology, this channel features live and on-demand videos with insights, updates and latest news on container security. Watch any video at your convenience or sign up to our channel.
Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security
Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
Join our webinar to learn:
•What are containers?
•How to use containers?
•What are the security challenges they introduce?
The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
1.How containers make it easy to migrate and move applications between clouds
2.What architectural considerations and tooling you need to achieve portability
3.How to ensure consistency of control, security, and compliance across container cloud deployments
The Center for Internet Security (CIS) recently published a Benchmark specification for securing Kubernetes host machines.
In this webinar we will take a closer look at the CIS Kubernetes Benchmark, and discuss how Kubernetes users can apply best practices from the Benchmark in their own deployments. We will cover aspects of secrets management, user authentication and authorization and the use of least privileges. We will end up with a demonstration of our very own kube-bench, an Open Source tool for testing benchmark compliance.
Join Michael Cherny, Head of Security Research and Liz Rice, Technology Evangelist, to learn about practical actions you can take to make your Kubernetes deployment more secure.
As organizations adopt containers and prepare to use them in production environments, the issue of managing secrets becomes a major concern:
How do you assign and deploy secrets to containers while keeping them secure?
How do you avoid secrets being visible on the network and host, and ensure they do not persist on disk?
How do update, rotate and revoke secrets without interrupting the containers that use them?
How do you leverage existing secrets stores (KMSs) and extend their use to containers?
Join our webinar as we take a closer look into the ‘secrets’ of managing secrets and:
· Learn some of the “do's and don'ts” of securing secrets
· Learn the cardinal security requirements of secrets management
· Watch a live demonstration to learn how secrets can be stolen from a node and how to extract secrets from an encrypted storage.
“Containers Are Not Just Small Virtual Machines; They Need New Security Strategies.” - Forrester report: Ten Basic Steps to Secure Software Containers, April 17, 2017.
While the rise of the Docker runtime environment and container format has brought standardization to container environment - according to the Forrester report, 31% of enterprise cloud developers are using containers during design and testing - risks to containers are on the rise as well. In this webinar, we will go over ten security steps to secure containers.
Join our webinar to learn how to:
• Secure containers now, before they put your customers at risk
• Understand the distinct security implications of the layered container stack
• Master the 10 tasks to protect your container environment
Aqua Security webinar featuring Forrester Research.
We’ve all heard of containers, and as Docker’s tagline suggests, they let you “Build, Ship, Run, Distributed Applications, Anywhere”. In some ways they are a bit like a lightweight Virtual Machine, but what does that really mean? In this presentation we will go through some container basics, and then show what a container really is (and how container engines like Docker work) by writing a container in a few lines of code.
Join our webinar in order to learn:
•How a container engine uses namespaces and control groups to create containers
•What makes containers so appealing to developers
As DevOps role in the IT management is growing and virtual containers are rapidly gaining popularity – Docker is the fastest growing DevOps tool – DevOps now need to deal with security issues as well, and rethink their overall security strategy. How can they maintain an enterprise-grade security? Join our webinar to learn:
•How to manage vulnerabilities in container images at DevOps speed?
•How to fully automate security tests and bake them into your pipeline?
•How to satisfy IT security and compliance requirements with minimal effort?
Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
Join our webinar to:
-Understand what are the primary threats to container environments
-Learn how to set up a security program for virtual containers, from development to runtime
-Hear why dynamic behavior detection should be part of your ongoing security monitoring
Are you using containers (e.g. Docker) in your organization? Is your software safer on containers? In this session we will talk about security steps you need to take to make sure your security is aligned with your design process.
DevOps aim to increase one’s speed of software delivery, but not with the same old architecture. One also needs microservices and containers (e.g., Docker) to package software for incremental change. But containers are new, and they introduce a range of new security issues that developers and security architects have not had to deal with before.
Guest presenter, Randy Heffner of Forrester Research, answers questions about microservices and container best practices