Webinars

Search Results 151 - 162 of 394

On-Demand Webinar

Continuous Compliance on Azure 

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

On-Demand Webinar

Protecting Against Log4j Attacks in AWS Fargate

Join us for a live demo of a Log4j attack on a Fargate task and how to detect it in real-time! We’ll share best practices around detection and mitigation of the log4j vulnerability running in serverless environments.

On-Demand Webinar

Bereid je voor op de volgende log4j!

Bereid u voor op de volgende log4j door samen met Marcel Claassen van ons Solution Engineering-team te leren hoe u kunt bepalen of uw systemen zijn getroffen & hoe u zich kunt beschermen met mitigerende maatregelen.

On-Demand Webinar

How to Prepare for the Next Log4j

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

On-Demand Webinar

Image Scanning on Azure

Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Image scanning refers to the process of analyzing the contents and the build process of a container image in order to detect security issues, vulnerabilities, or bad practices. Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.

On-Demand Webinar

Combat Critical Cloud Vulnerabilities

Cloud and containers are being adopted by a broad set of organizations as they try to maintain a competitive advantage. In our recent Cloud-Native Security and Usage Report, we found that 75% of containers in the cloud have vulnerabilities!