securing the perimeter - cfcr/cfar chain of custody with ci/cd pipelines - keith strini, pivo
Published 3 years ago • 102 plays • Length 34:36
Download video MP4
Download video MP3
Similar videos
-
33:08
securely provisioning cloud resources using kyverno and crossplane
-
23:34
secure container supply chain with notation, oras, and ratify
-
9:04
keynote: pipeline as code empowering cloud-native ci/cd on kubernetes using o... christian hernandez
-
32:32
solving multi-service without a service mesh - evan anderson, vmware
-
20:19
multi-cluster kubernetes ci pipelines with droneci
-
45:49
a security state of mind: continuous security with kubernetes by chris van tuin, red hat
-
33:25
multi-cluster networking and service discovery leveraging nri - lingming xia & di xu
-
46:19
kubeclarity : bringing clarity to your kubernetes artifacts security
-
17:04
verifiable build environments in the cloud: powered by sigstore and enclaves - fabian kammel
-
12:11
kubernetes security - relevancy
-
17:58
data security and storage hardening in rook and ceph - federico lucifredi, red hat
-
36:02
kubernetes supply chain security: the software factory - andrew martin, control plane
-
24:45
using policy as code to manage security risk in kubernetes
-
35:29
dynamic configuration with componentconfig and the control loop - chris hein, apple & leigh capili
-
34:39
how symlinks pwned kubernetes (and how we fixed it) - michelle au, google & jan šafránek, red hat
-
39:03
5 key steps to securing a default kubernetes cluster
-
34:00
gatekeeper: flexible, shareable policy for kubernetes - craig peters, mircosoft
-
27:51
the missing piece of your gitops pipeline
-
36:43
untrusted execution: attacking the cloud native supply chain - andrew martin, controlplane
-
35:30
sig security: unravelling the kubernetes security audit together
-
32:47
combining confidential computing and cloud native security by moritz eckert and saul o'driscoll
Clip.africa.com - Privacy-policy