AVOIDING NASTY SURPRISES IN YOUR CLOUD NATIVE SOFTWARE

WATCH ON DEMAND NOW

Register Now

Ensuring DevOps teams are making use of only authorized images is a key element of cloud native security. But with teams relying on open source and third party software for speed and repeatability, DevSecOps teams can’t depend solely on trusted images entering the pipeline.

In this webinar, we will discuss a set of strategies that DevSecOps teams can maintain to manage the risk of the software supply chain as attackers find ways through open source projects and commonly used packages as a vector for malicious code and launch exploits at run time.

In addition, how do we secure the infrastructure and application workloads to reduce the attack surface, prevent unwanted threats, and deny unauthorized access to the platform

 

Reasons to watch

  • Learn best practices for establishing security gates for container image analysis before deploying into production
  • Learn how to integrate vulnerability and malware remediation into DevOps workflows
  • How to use monitoring and policies to identify and protect against malware and new supply chain attacks at run time 

SPEAKERS

Steve Coplan

Strategic Partner Product Marketing at Aqua Security

Kevin Ng

Solution Architect, Mirantis

Jacob Meloche

Team Lead & Associate Solutions Architect at Aqua

Watch Now

By submitting form you are agree to our Privacy Policy