Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 2 weeks ago | 57 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 38 mins 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 2 weeks ago | 57 mins 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... 2 months ago | 61 mins End of On-Premise WAFs and Need for a New Application Protection Architecture Prakash Sinha In today's digital age, businesses are constantly seeking new ways to innovate and stay competitive. As more companies move to a majority online prese... 1 month ago | 51 mins End of On-Premise WAFs and Need for a New Application Protection Architecture Prakash Sinha In today's digital age, businesses are constantly seeking new ways to innovate and stay competitive. As more companies move to a majority online prese... 1 month ago | 50 mins Essential Guidance for Taming Cloud Complexity via Unified Multicloud Management Mary Johnston Turner, Research Vice President at IDC Successful enterprises often rely on multiple cloud services to enable mission critical digital initiatives. Ensuring consistent performance, securit... April 20, 2023 4:00pm Cloud workloads: Best practices onboarding apps to a Kubernetes-based platform Paul Whiten, Red Hat; Manu Joy, Red Hat and Somnath Banerjee, Red Hat After deciding which cloud migration approach to take, you need to understand the nuances of the platforms that will be running your workloads. Kubern... March 28, 2023 5:00am Deep Observability Pipeline: What It Is and Why It Matters Stephen Goudreault, Gigamon and Bassam Khan, Gigamon In today's hybrid and multi-cloud world, it’s more important than ever for infrastructure and security teams to get unified visibility across multiple... 5 hours ago | 32 mins IT Priorities 2023: Top cyber security trends in APAC Aaron Tan, Editor in Chief, APAC, TechTarget Organisations in APAC continue to prioritise cyber security in their IT budgets this year. In this video, hear from TechTarget’s APAC editor in chief ... 1 day ago | 8 mins Load more