Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ensuring security and resiliency for Kubernetes on OpenShift Ivan Sharamok, Solutions Architect, Tigera and John Armstrong, Product Marketing Director, Tigera Is your platform team challenged with moving Kubernetes workloads into production because of security and reliability requirements? Purpose-built fo... 9 months ago | 38 mins Securing Kubernetes in your cloud-native journey: Lessons learned Bryan Langston, Sr. Solution Engineer, Mirantis and Nico Kabar, Sr. Business Development Solution Architect, Tigera From just starting your journey to running production Kubernetes deployments, each step of the journey has its own set of technical and operational ch... 2 years ago | 57 mins Ensuring security and resiliency for Kubernetes on OpenShift Ivan Sharamok, Solutions Architect, Tigera and John Armstrong, Product Marketing Director, Tigera Is your platform team challenged with moving Kubernetes workloads into production because of security and reliability requirements? Purpose-built fo... 1 year ago | 38 mins How to Chart Your Route to Cloud Native Amit Gupta, VP Product Management, Tigera and Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies Join this live Q&A with Amit Gupta, VP Product Management at Tigera, as he provides tips, advice, best practices and industry insights into going clou... 4 years ago | 24 mins Kubernetes Ingress & Egress Traffic Management Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera The networking infrastructure within a Kubernetes cluster is usually private, or at least internally oriented. So what do you want to do when you nee... 3 years ago | 38 mins What’s New in Tigera Calico: An Update on Recent Features & Enhancements Eddie Esquivel, Sr. Solutions Engineer with Tigera Free and Open Source, Tigera Calico delivers secure networking for the cloud-native era, and 2019 has seen many major enhancements to the most deploye... 3 years ago | 33 mins Kubernetes Security: Detecting Lateral Movement and Defending Against Attackers Garwood Pang, Tigera Threat Defense Researcher As Kubernetes matures, gone are the days when we can fully compromise a cluster by just taking over a pod and sending commands to the Kubernetes API s... 2 years ago | 50 mins Kubernetes: Anatomy of the Shopify Attack & How to Defend Your Infrastructure Garwood Pang, Security Researcher at Tigera The potential attack on Shopify’s Kubernetes-based infrastructure grabbed headlines last year. This highlights the fact that Kubernetes managed applic... 3 years ago | 58 mins 5 Ways to Detect Malicious Activity & Protect Your Kubernetes Workloads Manoj Ahuje, Threat Intelligence Research Engineer. Tigera Organizations are rapidly moving more and more mission-critical applications to Kubernetes and the cloud to reduce costs, achieve faster deployment ti... 3 years ago | 44 mins 5 Tips to Organizing Your Kubernetes Security Policies Cody McCain, Solution Architect, Tigera During our client engagement process, we consult and help our customers define the right architecture for their security policies. There are several p... 4 years ago | 24 mins Load more