Search Results

Search Results 21 - 30 of 654


Top 20 Dockerfile best practices

Learn how to prevent security issues and optimize containerized applications by applying a quick set of Dockerfile best practices in…

On-Demand Webinar

Container Security Best Practices on Azure Kubernetes Service (AKS)

As containers and Kubernetes are adopted in production, security is a critical concern. DevOps teams need to go beyond image scanning, expanding into the areas of runtime security, network visibility and segmentation, incident response and compliance. These use cases become priorities as your Kubernetes security framework matures. Join Eric Carter from Sysdig and Tommy Falgout from Microsoft, as we share an overview of security on Azure Kubernetes Service (AKS), discuss approaches used by open source and commercial tools, and hear how Azure users are keeping their code and containers secure without impacting developer productivity.

On-Demand Webinar

IBM and Sysdig – How to Drive More Security and Reliability

IBM and Sysdig have partnered to help clients run more secure and more robust applications, tools, and services, by providing new levels of intelligence and visibility across your workloads. During this webinar, IBM and Sysdig will share how you can leverage the latest tools to better secure and manage your tools, applications, and services, including demos showing AI in action.

On-Demand Webinar

Kubernetes Attacks: What your cluster is trying to tell you

If an attacker got inside your cluster, would you know about it? Kubernetes has become the defacto standard for container orchestration, bringing with it a new set of security challenges. One of the biggest problems we see, among DevOps and Security teams alike, is a lack of knowing what to look for when it comes to malicious activity. In this session, you’ll learn how to detect and respond to threats at runtime. We’ll share practical strategies for pinpointing malicious activity, and you’ll be armed with the knowledge and confidence to not delay efforts to secure your Kubernetes and container environment. We’ll also look at examples for how many enterprises are already reducing risk with a secure DevOps approach.