Back to Search Begin New Search Save Search Auto-Notify
Trust, Verify & Authorize with DevSecOps
You may have a secure application today, but you cannot guarantee that it will still be secure tomorrow. Application security is a living process that must be constantly addressed throughout the application lifecycle. This requires continuous security assessments at every phase of the software development lifecycle (SDLC). The SEI has researched a continuous authorization concept—DevSecOps—that allows for constant interaction betwe...
Add Favorite
Get Apps Into Production Faster on Any...
View this on demand webinar where VMware subject-matter experts discussed: How VMware Tanzu helps standardize K8s operations and developer experience across clouds How to build with an open source first mindset How VMware Tanzu cloud native application platform can enable enterprise security with compliance, access controls, scanning tools, and more
Add Favorite
Transforming Government's Digital Prese...
In the realm of government, a seamless and impactful digital presence is no longer a luxury—it's a necessity. Attendees joined us discover the strategic alliance of Acquia and Amazon Web Services (AWS) emerging as a potent force that empowers federal, state, and local government agencies to elevate their online engagement and service delivery. During this on-demand session, we will delved into the intricacies of our partnership, explorin...
Add Favorite
Security and Compliance in 2024: Trends...
A content management system (CMS) is a key piece of the foundation for building modern digital experiences that span farther than just your website today. Global brands such as Mars, Stanley, Black & Decker, NASA and many more have trusted Drupal as their CMS to power their brand differentiating experiences. However, with a rise in cyber attacks, the security of your digital platform is critical. Join us for an insightful conversation with...
Add Favorite
Securing Mission-Critical Communication...
Defense industries deal with sensitive information that, if leaked, could compromise national security. Want to enable commanders and ground operators to exchange classified information securely? A self-hosted, air-gapped environment is the way to go! Air-gapped collaboration tools ensure a high level of security. They isolate sensitive data from unsecured networks — which empowers users to communicate securely without compromising the...
Add Favorite
Back to Search Begin New Search