InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Top 5 Cloud Native Pipeline Security Considerations

Presented by

Steven Terrana, Senior Lead Technologist, Booz Allen Hamilton and Dan Papandrea, Field CTO, Sysdig

About this talk

In this webinar, we’ll take a deep dive into Booz Allen Hamilton’s award-winning ways of securing modern software development. Specifically, we’ll share strong learnings and best practices to confidently protect your pipeline at each stage. Join us to learn more about these top five (5) cloud-native security considerations: - Turnkey security for your pipelines - Container/host configuration management policies - Protection against runtime threats - Automating rule changes - Post-mortem and prevention
Sysdig

Sysdig

11130 subscribers83 talks
Secure Every Second
In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights, a unique AI architecture, and open source Falco. Sysdig delivers live visibility by correlating signals across cloud workloads, identities, and services to uncover hidden attack paths. By knowing what is running, teams can prioritize the vulnerabilities, misconfigurations, permissions, and threats that matter most. From prevention to defense, Sysdig helps enterprises move faster and focus on what matters: innovation. Sysdig. Secure Every Second.
Related topics