Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date What if Your Code Vulnerabilities Got Fixed Automatically? Ori Bendit and Matt Slotten Developers face a constant cycle: Deliver new features, implement bug fixes, refactor existing code, repeat. It’s tough for them to find time for chor... April 25, 2023 3:00pm Avoid Kubernetes security risks with hardening best practices Henry Coggill: Compliance PM, Lech Sandecki: Ubuntu Pro PM, Alex Jones: Engineering Director, Kubernetes Hardening a system is synonymous with reducing its attack surface: remove unnecessary software packages, lock down default values to the tightest poss... 1 day ago | 42 mins How to use Mirantis Container Runtime to secure business-critical applications Kevin Ng In a cloud native world, your container runtime is the keystone of a secure software supply chain—but bare-bones components like containerd lack enter... May 3, 2023 7:00pm Webinar - Live Nexus Lifecycle Demo Joe Bernie - Senior Solutions Engineer - Sonatype To develop software fearlessly, you need transparency and automation across all third-party components and libraries. Experience zero productivity a... 1 month ago | 38 mins 2023 Ways To Secure Your Container Michael Man; Andy Sutcliffe, Ravi Golla and Felix Wolff As developers embrace cloud-native computing practices, containers have become essential for simplifying software deployment and runtime environment c... 2 months ago | 50 mins The Need for Speed: Accelerated AppSec Scanning in Azure DevOps Repos Vital Batyr, Mend | Andy Huang, Microsoft | Michael Holder, LEARFIELD Until recently, application security testing was cumbersome and time-consuming. Now, enterprises using Azure DevOps Repos can add automated applicatio... 4 months ago | 37 mins From Reactive to Proactive, Changing the Culture on API Security Steve Boone, Head of Product Management Your developers are using APIs everywhere. But are your APIs secure? Statistics demonstrate that 95% of companies have experienced attacks targeting t... 5 months ago | 37 mins Application Security Scanning in the Repository_ Best Practices SUSAN ST. CLAIR Director of Product Management - WhiteSource Historically, if organizations wanted to automate and enforce application security testing, the best place to do that was within CI/CD pipelines. As ... 1 year ago | 44 mins Security From Code to Cloud and Back to Code Jim Armstrong - Senior Product Marketing Manager | Snyk Cloud and DevOps practices blur the boundary between application development and the production cloud environment. Solutions that satisfy the needs of... 6 months ago | 27 mins Application Security Scanning in the Repository_ Best Practices SUSAN ST. CLAIR Director of Product Management - WhiteSource Historically, if organizations wanted to automate and enforce application security testing, the best place to do that was within CI/CD pipelines. As ... 10 months ago | 44 mins Load more