The world of ephemeral computing using the cloud, containers, and Kubernetes continues to evolve in ways that are both innovative and challenging. Change happens so fast it's hard for Security and GRC professionals to keep up. Organizations need to take a holistic approach to Kubernetes security and consider both the...
In the increasing landscape of cloud technology, organizations must sort out the IT portion of the M&A process. The high profile nature of cloud, security, and the scope of data that is managed, and as a result, vulnerable to misuse, mismanagement, or exposure is a critical component to get right as part of your...
As sophisticated malware continues to evade existing detection tools and
processes, security teams must adopt new technologies and use them to deploy
new detection, hunt, and response capabilities.
Security teams looking to improve
threat intelligence, hunting, analysis, and rapid response capabilities...
DevSecOps is often associated with securing a development pipeline in traditional CI/CD frameworks. Join this session, held by Henrik Johansson, Principal - Office of the CISO at AWS, as he discusses and shows:
How public cloud technology enables you to fully embrace security automation in your infrastructure
How...
Containers are shaping the way organizations are developing and managing applications nowadays. However, many are not always fully aware of the measures that need to be taken across the entire software development lifecycle, especially when it comes to open source security aspects. The mindset of securing our...
DevSecOps has taken the world by storm. Ever since the DevSecOps philosophy stepped into the limelight in the past few years, a growing number of organisations are trying to ensure their businesses are set up with the security in mind (and practice) from the get-go.
In theory, the concept is great. In practice?...
Containers are becoming more popular, but how do you deal with the security challenges of using containers?
You have to secure the application, the code, the web server and the host itself.
And how do you do this at the speed of DevSecOps?
Join Tim Chase, Director of Information Security at Healthstream, as he...
Malware continues to increase in sophistication and
routinely evades organizations' cyber defenses. It lurks
inside networks, often for months, executing or waiting
to execute attacks that can cause significant damage.
Even though the industry has developed various
technologies to bolster detection and response,...
A handful of common lures still have astounding success in compromising computers: phishing emails, malicious links and the king of them all: the malicious Microsoft Office document. But Microsoft is introducing virtualized containers in Office 365, which will isolate untrusted documents.
Public cloud users are confused as to who owns their cloud security, when the reality is that cloud users must protect their data.
Download this infographic for an overview of the top challenges organizations face with cloud security.
To deploy faster and easier cloud native applications, enterprises are challenged to establish a different IT consumption model while providing classical IT services.
This webinar will help you further develop your strategy for cloud native applications and container platforms. As in our previous webinar, we will...
The Food and Drug Administration has issued an alert warning healthcare organizations about 11 vulnerabilities dubbed "URGENT/11" involving IPnet, a third-party software component that may introduce risks for certain medical devices and hospital networks.
IT infrastructure is being disrupted by cloud technology and new application development methodologies like microservices/containers.
This webinar will help you understand the values of these technologies for your business, as a new way of consuming IT. Without digging deep in technology, the webinar will cover how...
Want to keep up with your dynamic environment with unified insights? Splunk for container monitoring provides a solution to help ensure your containers are available, and issues are fixed quickly with minimal effort. Now your developers can focus on what's most important - the application itself.
Want to keep up with your dynamic environment with unified insights? Splunk for container monitoring provides a solution to help ensure your containers are available, and issues are fixed quickly with minimal effort. Now your developers can focus on what's most important - the application itself.
Join this webinar...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.