Webinars

Search Results 131 - 142 of 393

On-Demand Webinar

A Comprehensive Approach to Cloud Threat Detection and Response

In this webinar, SANS Sr. Instructor Jake Williams and Mike Isbitski, Director of Cybersecurity Strategy, Sysdig, make the case for implementing a combination of agent-based and agentless cloud-native security tooling, an approach that provides outcomes far superior than either solution on its own.

Guide

Kubernetes Rightsizing Guide

Kubernetes is the most used container orchestration system. Since its release in 2014, it has driven a complete revolution in the cloud applications environment.
It’s done this by using powerful abstractions – like Pods – and a high-availability design to incentivize the creation of cloud-native applications and, more importantly, their deployment into production environments.

On-Demand Webinar

Shifting Security Further Left with IaC Security

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Brief

Sysdig Platform for IBM zSystems and IBM LinuxONE

IBM zSystems and IBM LinuxONE are designed to prevent security threats and protect data across a hybrid cloud environment with certified multitenant workload isolation as well as transparent, pervasive encryption with optimized performance. The Sysdig Platform helps build a security‑focused, Kubernetes‑based foundation for developing, deploying, and managing applications in containerized and cloud environments.