Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Takeaways from Recent Software Supply Chain Developments Anthony Decicco, GTC Law Group Modern application development and deployment models make for a software supply chain that’s more complicated than ever before. While managing the ope... 2 months ago | 42 mins Takeaways from Recent Software Supply Chain Developments Anthony Decicco, GTC Law Group Modern application development and deployment models make for a software supply chain that’s more complicated than ever before. While managing the ope... 3 months ago | 42 mins Docker security and FIPS compliance from air gap to cloud Valentin Viennot: PM for the Ubuntu containers, Henry Coggill: Compliance PM, In a world where security breaches are a daily headline, the need for reliable and compliant digital solutions is paramount. For example, U.S. agencie... June 13, 2023 4:00pm Java container optimization for the cloud Severin Gehwolf, Red Hat Principal Software Engineer Developing and deploying Java applications to the cloud is easy, right? Copy the über jar of your application into a directory and run it in any Java ... 2 weeks ago | 47 mins How to use Mirantis Container Runtime to secure business-critical applications Kevin Ng In a cloud native world, your container runtime is the keystone of a secure software supply chain—but bare-bones components like containerd lack enter... 1 month ago | 38 mins How to use Mirantis Container Runtime on Windows Server with Azure Kevin Ng With Microsoft’s May 2023 Windows Server updates, users will need a way to run a fully-featured Docker interface—with enterprise support and up-to-dat... 2 months ago | 32 mins Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending Jim Reavis, CSA, Michael Isbitski, Sysdig and Crystal Morin, Sysdig Just released - the sixth annual Sysdig Cloud-Native Security and Usage Report which focuses on the security concerns keeping everyone up at night: su... 3 months ago | 47 mins DEMO - See Workload Protection, WAF and API Security in Action Ivan Melia, Senior Manager Product Marketing, Prisma Cloud by Palo Alto Networks Join us for a 30-minute demo session to see how to get complete security across your application lifecycle with Cloud Workload Protection by Prisma Cl... 1 month ago | 34 mins From Zero to Hero in Kubernetes Native Java Daniel Oh - Developer Advocate, Red Hat Runtimes More than 16.5 million Java developers are currently working to realize business requirements and spend a ton of time and effort to optimize the appli... 2 months ago | 64 mins Admission Control: Easily setting policies and guardrails for cluster operations Alfred Trevino - Cloud Technical Marketing Manager, Check Point In this webinar (presented together with CheckMates) we will see how using Kubernetes Admission Control helps customers move govern all cluster operat... 3 months ago | 74 mins Load more