Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Simple Kubernetes App Deployments Mark Lavi, Nikita Epshstein & Thomas Keenan Helm Charts are a popular way to deploy applications on Kubernetes but it can be challenging to configure Chart values properly the first time. Join ... 1 week ago | 59 mins The Future of AppSec: What You Need To Know Chai Bhat, Product Marketing Manager The Forrester report, “The State of Application Security: 2022,” notes that web application exploits are the third-most-common cybersecurity attack. O... 4 weeks ago | 38 mins How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 2 weeks ago | 28 mins Takeaways from Recent Software Supply Chain Developments Anthony Decicco, GTC Law Group Modern application development and deployment models make for a software supply chain that’s more complicated than ever before. While managing the ope... 3 weeks ago | 42 mins The Digibee 2022 Enterprise Integration Report | Episode 7 Cait Porte - CMO, Tam Ayers Cait Porte is joined by Digibee field CTO, Tam Ayers, to discuss Digibee’s published State of Enterprise Integration Report. The report surveyed 1,000... 3 hours ago | 16 mins Boost productivity with a modern database architecture with Confluent & AWS Joseph Morais, Staff Cloud Partner SA, Confluent | Riggs Goodman, Senior Networking Partner SA, Amazon Web Services (AWS) Cloud databases enable critical business insights and advanced analytics for organizations. With Confluent, you can build streaming data pipelines fro... March 21, 2023 2:00pm NoSQL security scanning: Finding and remediating MongoDB vulnerabilities Sven Morgenroth, Invicti Staff Security Engineer NoSQL injection attacks against MongoDB databases are a major threat to full-stack JavaScript applications. The OWASP Top 10 for 2021 lists injection ... March 21, 2023 10:00am JSON Web Token (JWTs) are Dangerous Will Johnston: Senior Developer Growth Manager JSON Web Tokens are a popular choice for managing user sessions. However, many security experts at companies like Auth0 and Okta have published numero... March 21, 2023 7:00pm Protecting Your Applications and APIs with Modern Ingress Security Frank Yue, Senior Product Marketing Manager Application architectures are evolving, and security needs to evolve with it. Web application and API protection is critical in today’s multi-cloud an... 4 days ago | 56 mins Deploy Secure, Scalable Kubernetes Apps with Tanzu Service Mesh and Ingress Serv Manish Chugtu, Bhushan Pai As enterprises modernize and build container-based Kubernetes applications, they are confronted with a lab-to-production gap that challenges their abi... March 21, 2023 3:00pm Load more