Hi [[ session.user.profile.firstName ]]

Twistlock

  • Date
  • Rating
  • Views
  • How to Modernize Your IT Infrastructure & Secure Your Applications
    How to Modernize Your IT Infrastructure & Secure Your Applications Lee Calcote, SolarWinds, Jim Bugwadia, Robert Starmer, Kumulus Technologies, and John Morello, Twistlock Recorded: Jun 14 2018 46 mins
    Join this live panel discussion with experts at DockerCon to learn how containers and microservices can help modernize your IT infrastructure and increase application security.

    Tune into this interactive Q&A session to hear from Docker, Infrastructure, Cloud and DevOps experts while they discuss the following:

    - The pros and cons to modernizing your monolithic applications
    - Trends and technologies in application security
    - The security risks associated with open source and cloud native applications
    - How containers and microservice architectures can increase security and modernize your IT infrastructure

    This live panel will be streamed directly from DockerCon 2018 in San Francisco! Join us live from the comfort of your desk.

    Moderated by: Lee Calcote, Head of Technology Strategy, SolarWinds
    Panelists: Jim Bugwadia, Founder, Nirmata, Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies and John Morello, CTO, Twistlock
  • Beyond Containers: Going Cloud Native with Serverless Architectures
    Beyond Containers: Going Cloud Native with Serverless Architectures John Morello, CTO, Twistlock and Lee Calcote, Head of Technology Strategy, SolarWinds Recorded: Jun 14 2018 28 mins
    The journey to cloud native can be a winding road, and with more and more organizations starting on this journey, companies are being taken far beyond just simply containerizing applications.

    Join this live Q&A with John Morello, CTO of Twistlock as he discusses how server-less and container-as-a-service platforms like AWS Fargate are changing how organizations deploy applications - and what this means for security.
  • From Development to Production: Securing Today's Cloud Native Infrastructure
    From Development to Production: Securing Today's Cloud Native Infrastructure John Morello, CTO, Twistlock & featured speaker Amy DeMartine, Principal Analyst, Forrester Recorded: Mar 29 2018 61 mins
    From Development to Production: Whats Required to Secure Today's Cloud Native Infrastructure?

    As enterprises embrace containers and other cloud native technologies, they are recognizing the need to shift to a modernized approach to security integrated across the application lifecycle. This new approach requires developers and security teams to rethink their tools and processes in order to ensure best in breed protection covering the full application lifecycle.

    Join Twistlock CTO John Morello and featured speaker Forrester Analyst Amy DeMartine in this webinar to learn:

    •The latest data around container adoption, implementation and security in the enterprise
    •Container and cloud native security best practices across the application lifecycle
    •Specific use cases and practical advice for implementing these best practices for robust cloud native environments

    Register for this webinar to learn more!
  • Securing Containers w/ NIST SP 800-190
    Securing Containers w/ NIST SP 800-190 John Morello, Twistlock CTO & Murugiah Souppaya, Computer Scientist at NIST Recorded: Mar 7 2018 52 mins
    In late 2017, The National Institute of Standards and Technology (NIST) released Special Publication (SP) 800-190, the Container Security Guide, a set of guidelines for securing container applications and infrastructure.

    This panel webinar, hosted by NIST SP 800-190 co-authors, John Morello (CTO, Twistlock), and Murugiah Souppaya (Computer Scientist, NIST) will cover:

    • Why NIST SP 800-190 was created, the open process used to develop it, and how all organizations can benefit from it
    • Some of the specific container risks identified in the SP
    • Top recommended countermeasures for each risk
    Implementation guidance and best practices

    In addition, the session will highlight how organizations can leverage functionality provided by container-focused orchestration and security platforms to automate compliance across the development lifecycle - reducing overall attack surface and delivering comprehensive threat protection.
  • Trends in Container and Cloud Native Cybersecurity
    Trends in Container and Cloud Native Cybersecurity Josh Thorngren, VP of Marketing at Twistlock Recorded: Jan 23 2018 34 mins
    As software eats the world, cloud native tools and methodologies — like containers and devops— are continuously evolving. Organizations that can identify the major trends in this ever-changing landscape and then successfully secure a new cloud native environment will have an advantage in the market.

    Join Twistlock's VP of Marketing, Josh Thorngren, as he shares the macro trends he’s seeing in the cloud native security space and the extended cloud native ecosystem in 2018.

    Specifically, we’ll cover:
    * Rethinking your organization’s approach to defend against the proliferation of easy-to-use, easy-to acquire hacks, exploits and malware
    * How to shift security left by developing an entirely new paradigm and set of principles for software delivery and protection
    * How to modernize legacy workloads with containers
  • Automating Security with Kubernetes
    Automating Security with Kubernetes Kevin Lewis, Solution Architect Recorded: Oct 4 2017 25 mins
    Kubernetes is a leading orchestration tool used by teams large and small to deploy containerized applications. It is also at an ideal point to automate rules that prevent high-risk vulnerabilities and compliance violations don’t enter production environments, and deploy runtime defenses that protect your applications.

    Join Twistlock Solution Architect Kevin Lewis to see how Twistlock integrates directly into Kubernetes to improve your risk and compliance posture without slowing down development.
  • Managing Compliance in Container Environments
    Managing Compliance in Container Environments Patrick Maddox, Sr. Director of SA, Twistlock and Adam Greenfield, Sr. Director of Enterprise Architecture, ClearDATA Recorded: Sep 14 2017 32 mins
    Customers and employees demand easier ways to interact with your organization. At the same time, regulatory requirements like HIPAA and PCI combined with huge amounts of sensitive data raise the stakes around building secure and compliant applications.

    Increasingly, organizations are looking to containers and microservices to provide the agility and scalability needed to satisfy their customers. But there are other crucial and oft-overlooked advantages of migrating to containers and microservices: Compliance and Security. Containers offer a number of opportunities for building and deploying more secure applications and environments.

    We’ll look at how containers enable automated security and compliance checks throughout the entire development lifecycle, from the first line of code through to runtime.

    Attendees will learn:
    •How to enforce compliance across the entire software delivery lifecycle
    •Best practices for securing container environments
    •Strategies and tips to scale application security and compliance
  • 6 Reasons Why Dev Should Own Security
    6 Reasons Why Dev Should Own Security Geva Solomonovich, Snyk and John Morello, Twistlock Recorded: Aug 18 2017 21 mins
    Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.

    To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.

    Join us for this to learn:
    - 6 reasons development should own security
    - Best practices to employing Shift-Left security
    - How to deploy secure apps at DevOps speed
  • Automated Security for Jenkins
    Automated Security for Jenkins Matthew Barker, Solutions Architect, Twistlock Recorded: Aug 17 2017 26 mins
    CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.

    Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
  • How to Securely Configure a Linux Host to Run Docker
    How to Securely Configure a Linux Host to Run Docker Kevin Lewis, Solution Architect, Twistlock Recorded: Jun 1 2017 28 mins
    Learn how to securely configure host settings and Docker Engine.

    Docker allows teams to increase the speed and scale that they can deliver software. As a result, adoption rates for docker are accelerating as more organizations are looking for ways to innovate faster.

    As you move down the path to containers, it is important to note that an out-of-the box installation of just about any Linux distribution is capable of running the Docker daemon and Docker containers, but it will leave your host exposed to many security and performance concerns if not configured properly.

    Join us for this webinar to learn how to:
    - Configure host settings to harden and protect it from unauthorized access
    - Install and configure a Docker Engine with minimal attack surface
    - Ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories

Embed in website or blog