Containers are becoming more popular, but how do you deal with the security challenges of using containers?
You have to secure the application, the code, the web server and the host itself.
And how do you do this at the speed of DevSecOps?
Join Tim Chase, Director of Information Security at Healthstream, as he...
A handful of common lures still have astounding success in compromising computers: phishing emails, malicious links and the king of them all: the malicious Microsoft Office document. But Microsoft is introducing virtualized containers in Office 365, which will isolate untrusted documents.
Public cloud users are confused as to who owns their cloud security, when the reality is that cloud users must protect their data.
Download this infographic for an overview of the top challenges organizations face with cloud security.
To deploy faster and easier cloud native applications, enterprises are challenged to establish a different IT consumption model while providing classical IT services.
This webinar will help you further develop your strategy for cloud native applications and container platforms. As in our previous webinar, we will...
Delayed enforcement of the "strong customer authentication" requirements for online transactions under the European Union's PSD2 regulation is hampering efforts to enhance security. That's why the European Banking Authority should act quickly to develop a new timeline.
IT infrastructure is being disrupted by cloud technology and new application development methodologies like microservices/containers.
This webinar will help you understand the values of these technologies for your business, as a new way of consuming IT. Without digging deep in technology, the webinar will cover how...
Want to keep up with your dynamic environment with unified insights? Splunk for container monitoring provides a solution to help ensure your containers are available, and issues are fixed quickly with minimal effort. Now your developers can focus on what's most important - the application itself.
Want to keep up with your dynamic environment with unified insights? Splunk for container monitoring provides a solution to help ensure your containers are available, and issues are fixed quickly with minimal effort. Now your developers can focus on what's most important - the application itself.
Join this webinar...
A critical part of any security infrastructure is providing the capacity to secure containerized applications across any platform, orchestrator, or cloud.
This Container Security Guide provides visual, easy-to-digest diagrams that show how to:
Ensure images are free from known vulnerabilities, secrets and...
Containerization introduces new processes that move code through the software development pipeline at an accelerated pace and with greater flexibility (or, less oversight).
This eBook explains how DevSecOps can deliver context-aware security while automating the entire image-to-production process, allowing...
A security researcher has found a significant flaw all versions of Docker, an open source container platform, that can give attackers read and write access to all the files within the host system, allowing them to execute arbitrary code. As of now, there's no patch available.
Docker, which offers an open source container platform, is notifying users that an intruder briefly had access to sensitive data from 190,000 Docker Hub accounts, or less than 5 percent of Hub users. But the breach has caused a collective gasp because it potentially magnifies risks for enterprises.
Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing the path...
Microsoft is ending its extended support for Windows Server 2008 and Windows Server 2008 R2 on January 14, 2020, which is not that far off. January 2020 is barely a year away. That does not leave a lot of time for IT pros to come up with a strategy for migrating applications away from Windows Server 2008, and on to a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.