
Securing microservices
06/20/18 • 40 min
Read this:
https://www.manning.com/books/reactive-application-development
Attend this:
https://www.cyberark.com/impact2018/
Join the discussion:
https://cloudsecurityalliance.org/group/containerization/#_overview
Read this:
https://www.manning.com/books/reactive-application-development
Attend this:
https://www.cyberark.com/impact2018/
Join the discussion:
https://cloudsecurityalliance.org/group/containerization/#_overview
Previous Episode

Smarter AI Ransomware: Your 5 Best Chances
Ransomware, like any other attack, is not inevitable if you can stop the attacker at even one step along a kill chain. We look specifically at the 5 steps of a ransomware as an example of how to improve your odds of avoiding a breach. Stewart Cawthray from Thomson Reuters, Allan Liska from Recorded Future, Tim Gallo from FireEye and Birat Niraula from CapitalOne provide lots of great advice!
Next Episode

DevSecOps: Developers play security offense
We look for the balance between developers' security responsibility and the security team. Maya Kaczorowski from Google, Shannon Lietz from Intuit and Larry Maccherone from Comcast help weigh the options.
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/cyber-security-threat-actions-this-week-114259/securing-microservices-5858558"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to securing microservices on goodpods" style="width: 225px" /> </a>
Copy