Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Kubernetes Access Controls with Calico Enterprise - How to apply egress access controls

No matter where you are in your Kubernetes journey, eventually you’ll have to connect your k8s cluster to external resources like databases, cloud services, and third-party APIs. A majority of existing workloads are non-Kubernetes, and at some point, your Kubernetes applications will need to communicate with them.

DevSecOps Best Practices with JFrog Xray

JFrog builds security products that enable organizations to trust their pipeline from development to deployment and production. In this webinar, you will learn how to leverage JFrog Xray to achieve radical transparency of the binary components in your data center. Understand the impact of these components on production system quality, performance, and architectural changes. We will also cover security topics such as circle of trust, security between locations, security replication, access tokens, and auditing.

What is DLP?

This video briefly explains what data loss prevention is and which steps are crucial to establish a DLP process in your organization. Your confidential, regulated or business-critical data is constantly at risk of being lost. For example, it could be leaked from an unsecure location, or it might be sent to the wrong recipient in an email. To prevent critical information from leaving your organization, you need data loss prevention (DLP).

Code Sight IDE Plugin Combines SAST and SCA to Analyze Proprietary and Open Source Code | Synopsys

Until now, single analysis tools have given developers only a partial view of security risks – providing either static analysis of proprietary code or software composition analysis of open source. This separation often leads to undetected vulnerabilities, decreased developer productivity, and longer release cycles.