DEF CON 27, Packet Hacking Village – Jay Beale’s ‘Attacking And Defending Kubernetes’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.
Permalink
The post DEF CON 27, Packet Hacking Village – Jay Beale’s … Continue reading DEF CON 27, Packet Hacking Village – Jay Beale’s ‘Attacking And Defending Kubernetes’

Cloud Native Application Security: Protection At and Within the Perimeter

What makes an application “cloud native” and what’s so different about protecting these kinds of apps? Ultimately, the answer lies in how cloud native applications are not as tightly bound to the infrastructure as traditional on-premi… Continue reading Cloud Native Application Security: Protection At and Within the Perimeter

Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

The Black Duck Connector for OpenShift, which identifies and tags open source components, can now scan Red Hat Quay container registry images via a webhook.
The post Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay i… Continue reading Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

The Black Duck Connector for OpenShift, which identifies and tags open source components, can now scan Red Hat Quay container registry images via a webhook.
The post Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay i… Continue reading Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

Snyk snags $150M investment as its valuation surpasses $1B

Snyk, the company that wants to help developers secure their code as part of the development process, announced a $150 million investment today. The company indicated the investment brings its valuation to over $1 billion (although it did not share the exact figure). Today’s round was led by Stripes, a New York City investment firm […] Continue reading Snyk snags $150M investment as its valuation surpasses $1B

DEF CON 27, Appsec Village, YanYan Wang’s ‘Automate Pen Testing In Dockerized CI CD Environment’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.
Permalink
The post DEF CON 27, Appsec Village, YanYan Wang’s ‘Autom… Continue reading DEF CON 27, Appsec Village, YanYan Wang’s ‘Automate Pen Testing In Dockerized CI CD Environment’

Application Layer Protection for Istio Service Mesh

Today, Signal Sciences announced another industry-first: the launch of our next-gen WAF integration with Istio service mesh. As development teams move from monolithic to distributed, microservices-based application architectures, managing the security … Continue reading Application Layer Protection for Istio Service Mesh

[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.
The post [Webinars] Container security, tool misuse and abuse, open source in M&A appeared … Continue reading [Webinars] Container security, tool misuse and abuse, open source in M&A

Enterprise News – ESW #156

Enterprise News
The post Enterprise News – ESW #156 appeared first on Security Weekly. Continue reading Enterprise News – ESW #156

[Webinar] Bring container security into OpenShift with Synopsys Operator

Modern applications contain over 50% open source components. Do you have an open source vulnerability management solution for your container environment?
The post [Webinar] Bring container security into OpenShift with Synopsys Operator appeared first … Continue reading [Webinar] Bring container security into OpenShift with Synopsys Operator