Join Frederick Kautz, John Kjell and Tom Meadows at Cloud Native Security Conference North America next week in Seattle. Thursday, June 27th is a day you don't want to miss for #SupplyChainSecurity. Demystify Modern Signing: Keys, Certs, and Envelopes - John Kjell, Director of #OpenSource at TestifySec. Thursday, June 27 • 11:50am - 12:25pm Ballroom 2-3 Guardians of the Dataverse: Securing the AI Supply and Data Chain - Frederick Kautz, Director of R&D, TestifySec. Thursday, June 27 • 2:45pm - 3:20pm Ballroom 2-3 The Story of Crush: The Microservice That Navigated the Cloud Native Ocean with a SPIFFE Identity - Mattias Gees, Venafi & Tom Meadows, open source engineer at TestifySec. Thursday, June 27 • 4:40pm - 5:15pm Venue: 435 Send them a message to meet up outside their talks. The Linux Foundation #cnscon #cloudnative #security #intoto
TestifySec’s Post
More Relevant Posts
-
The Hitchhiker's Guide to Pod Security - Lachlan Evenson, Microsoft With Kubernetes v1.23, Pod Security admission is now in beta. This built-in controller evaluates Pod specs against predefined security standards, deciding whether to allow or deny pod execution. Pod Security replaces the deprecated PodSecurityPolicy from v1.21 and will be removed in v1.25. In this presentation, Lachlan Evenson explore key Pod Security concepts and provide practical examples to guide cluster administrators and developers in enforcing secure defaults for their workloads. https://lnkd.in/e5YC4HHS #azure #cncf #k8s
The Hitchhiker's Guide to Pod Security - Lachlan Evenson, Microsoft
https://www.youtube.com/
To view or add a comment, sign in
-
Have you ever heard about IPFS? The InterPlanetary File System is a set of composable, peer-to-peer protocols for addressing, routing, and transferring content-addressed data in a decentralized file system. It provides security, privacy and resistance to censorship of your data. When you upload a file to IPFS, you receive a unique hash that uniquely identifies that file. This hash is called a CID (Content Identifier) and is generated using the cryptographic hash function SHA-256. The CID is essentially the "fingerprint" of the file and is used to retrieve and access the content in a decentralized manner across the IPFS network. Many web3 projects use this technology to ensure privacy and decentralization! https://ipfs.tech/
To view or add a comment, sign in
-
Hear what #Metcloud has to say about how #HPEGreenLake and #TDSYNNEX and how they are making waves for their customers in the financial sector – where privacy and security are key. http://tdas.so/7D0CAE
Metcloud case study
tdas.so
To view or add a comment, sign in
-
Hear what #Metcloud has to say about how #HPEGreenLake and #TDSYNNEX and how they are making waves for their customers in the financial sector – where privacy and security are key. http://tdas.so/9D7714
Metcloud case study
tdas.so
To view or add a comment, sign in
-
In Vegas for #AWSreInvent? See how Uptycs can help you secure AWS and connected assets from a single console and data lake. While there you can ask for an invite to our Sip 'N Security event with Intel Corporation tomorrow night. Can't make it? I got you. Here are two key solution briefs on #awssecurity and #kubernetessecurity
To view or add a comment, sign in
-
Use Vault to avoid hardcoding sensitive info. It ensures secrets are not hard-coded, provides fine-grained access control, encrypts data, supports dynamic secret generation, and integrates seamlessly with various technologies, aiding developers in adhering to security best practices while simplifying secret management in modern, cloud-native environments. https://lnkd.in/gCnpBK7f
Vault by HashiCorp
vaultproject.io
To view or add a comment, sign in
-
#CloudNative technology is taking the digital world by storm! 💥 But with great power comes great responsibility, and that means tackling security threats head-on. 🔒 Don't worry, SUSE and The Futurum Group have got your back! They've put together an ultimate guide to help you develop a rock-solid digital trust strategy, because in this fast-paced business landscape, trust is everything! 🌐✨ Get your hands on this free paper that will give you the edge: https://okt.to/QWMHyK #DigitalTrust #SecurityThreats #StayAhead #BusinessLandscape
SUSE | The Ultimate Cloud Native Security Guide
more.suse.com
To view or add a comment, sign in
-
Why encryption at the app level? Because regular "at rest" encryption is not good enough any more. As one of our customers pointed out after they fell victim to a recent hack, the only documents not compromised were those managed by DropVault. So how secure are your crown jewels? #infosec #privacy #investing #intellectualproperty #aws #microsoftazure
So how secure is your company IP, your secrets, you crown jewels? Are you still relying on regular access controls and security to keep them secure and private? Do you think that has worked for others? Our Data rooms are some of the most secure available - Always encrypted at the app level with a unique key for each room and conversational so your team can store and collaborate without your sensitive ever leaving the security of the data room. And if you need to include external advisors our data rooms can be shared with external contacts or multiple external teams while keeping a single copy of your data in the data room. https://lnkd.in/emPxiGT3 #intellectualproperty #projectmanagement #vc #investing #infosec #aws #microsoftazure #googlecloud
To view or add a comment, sign in
-
As the digital landscape evolves and the widespread use of #cloudnative technology continues to grow, so do security threats. 🔐Organizations must ensure digital trust among customers, partners and key stakeholders in order to remain competitive in this increasingly dynamic business landscape. 📩 Get this free paper by SUSE and The Futurum Group focused on key considerations to developing a robust digital trust strategy: https://okt.to/d9xz1c
SUSE | The Ultimate Cloud Native Security Guide
more.suse.com
To view or add a comment, sign in
-
Cloud Partner Executive EMEA North AWS Google Microsoft - Open Cloud Infra |Kubernetes managed by Rancher & NeuVector | Enterprise Linux @ SUSECloud
As the digital landscape evolves and the widespread use of #cloudnative technology continues to grow, so do security threats. 🔐Organizations must ensure digital trust among customers, partners and key stakeholders in order to remain competitive in this increasingly dynamic business landscape. 📩 Get this free paper by SUSE and The Futurum Group focused on key considerations to developing a robust digital trust strategy: https://okt.to/spRXY6
SUSE | The Ultimate Cloud Native Security Guide
more.suse.com
To view or add a comment, sign in
1,057 followers
Get 100 B2B Leads For Free ❤️ | DM “Leads” For Details | Co-Founder @ GrowthLink & Diiiploy | Growth Systems for B2B Brands | Sharing Content Daily on the Path to $10MM
1wThis lineup looks absolutely fantastic! The topics on modern signing and securing the AI supply and data chain are so relevant right now. I'm particularly intrigued by The Story of Crush" and how it navigated the cloud native ocean with a SPIFFE identity. Kudos to Frederick, John, and Tom for sharing their expertise. Anyone else attending? Would love to connect and discuss these sessions further! #Excited #LearningOpportunity #Networking