Results for Security
Docker Content Trust: How Container Signing Protects Users from Downloading Compromised Code
As Docker adoption explodes, malicious actors are increasingly focusing on container attacks. IDN Contributing Editor David Bisson reviews some of the best ways to protect your code – and your organization.
Full Story >Expanse for AWS Lets Users Secure Cloud-Facing Assets with Attack Surface Management
Expanse has optimized its attack surface management solution for Amazon Web Services. Expanse for AWS deploys automatically to provide full visibility into their public-facing cloud assets to limit unsanctioned accounts.
Full Story >Trend Micro’s Cloud One Now Protects Apps with Runtime Security, Preemptive Protection
Trend Micro is expanding its cloud-native security offerings with pre-emptive protection for a wide range of modern apps – cloud, hybrid, serverless and APIs. IDN explores Cloud One – Application Security with vice president Wendy Moore.
Full Story >Druva Delivers SaaS-Based Data Protection for Kubernetes
Druva is introducing a cloud-based SaaS solution to offer users simplified, enterprise-grade backup and disaster recovery support for Kubernetes. It also protects on-prem data centers and cloud workloads via a unified interface.
Full Story >FireMon Marries Security, Agility in New Agile Network Security Policy Management Platform
FireMon is bringing agility and speed to a range of security capabilities that companies say they need to adopt cloud more quickly. IDN looks at FireMon’s marriage of “agile” with network security policy management platform technology.
Full Story >Workato Aurora Combines AI, Low-Code To Rapidly Integrate, Automate Workflows
Workato has launched an update to its enterprise automation platform. The company's Aurora Release combines AI, low-code/no-code integration and more to prome faster app releases and deeper collaboration.
Full Story >Study Suggests Data Privacy Efforts Can Be Rewarded with Customer Loyalty
A recent study suggests that companies willing to invest in data privacy may be rewarded by customer loyalty. IDN summarizes findings from Privitar’s 2020 Consumer Trust and Data Privacy Report.
Full Story >Security at the Speed of DevOps: How Engineering Learned To Love Security in the Age of Covid-19
Covid has exacerbated the tension between software engineers and security teams, says Code CTO Rob Junker. In this post, he walks us through how to create a new DevSecOps culture that integrates security into app lifecycles at eye-popping speed.
Full Story >Cequence's API Sentinel Looks to Provide Continuous API Security, Visibility and Monitoring
Cequence is adding a new level of API security for continuous runtime visibility and protection. IDN looks at Cequence API Sentinel.
Full Story >IDC Study Finds Cloud Data Breaches Impact 80% of CISOs
Cloud data breaches are disrupting companies at an alarming rate, according to a recent study for chief information security officers (CISOs). IDN looks at recent findings from an IDC study.
Full Story >Okta FastPass Brings Passwordless Logins to Reality
This year, the vision for passwordless authentication gets real as Okta rolls out FastPass context-driven login technology. IDN explores how it works with Okta’s Joe Diamond.
Full Story >Survey: Even as More Firms Migrate Security Tools to the Cloud, Concerns Remain
Even as more companies migrate security tools to the cloud, a survey from SIEM provider Exabeam reveals concerns remain. Respondents admitted to concerns over data privacy, unauthorized access, server outages, and integration as critical concerns.
Full Story >Videos
A Standards-Based Framework 4 Cloud Identity
-
Paul Madsen - Senior Technical Architect, Office of the CTO
Low-Code Architecture Essentials for Modern Employee & Consumer Apps
- Carlos Carvajal CMO
- Matt Terry SVP Products
No Passwords, No Problem: Using WebAuthn To Stop Account Takeover for Browsers
- Swaroop Sham - Sr. Product Marketing Manager Customer Identity
Agenda - CloudCon: Management & Security
- [CA] Andy Kicklighter - Sr. Principal Product Manager
- [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
- [Oracle] Jyothi Swaroop - Product Director
- [Red Hat] Dave Egts - Principal Architect
- [Red Hat] Chris Wells - Senior Product Marketing Manager
- [IBM] Robert Vila - WebSphere Connectivity & Integration Product Management
Building a Secure Open Hybrid Cloud
-
Dave Egts - Principal Architect
-
Chris Wells - Senior Product Marketing Manager
Securing Mobile - Cloud and API Services
- Robert Vila - WebSphere Connectivity & Integration Product Management
Applying a Data-centric Security Strategy to the Cloud
- Troy Kitch
Sr. Principal Director, Security Software
Ensuring Service Levels in the Clouds
-
Andy Kicklighter - Sr. Principal Product Manager
Security Threats, Frameworks and Mitigation Efforts
- Peter Allor
Security Strategist
A Standards-Based Framework for Cloud Identity
-
Paul Madsen - Senior Technical Architect, Office of the CTO
Practical Steps to Secure your APIs for Mobile
- Mark O’Neill
VP Innovation, Axway
Technologies for a Data-Centric Security Approach
- Sudeep Venkatesh
VP, Solutions Architecture
Oracle Mobile Security
- Dave Smith
Sr. Principal, for Identity Management and Security
Bridging the Security Gap Between IT and Developers
- Bradford Stephens
Developer Evangelist Office of the CTO
Enterprise API Security Choices - One API - Total Security
- Blake Dournaee
Senior Product Manager Expressway Service Gateway
How To Leverage Cloud To Improve Your Compliance Status
- Heather Hinton
IBM Distinguished Engineer
Cloud Security and Compliance Architecture