Getting Started with the Service Mesh
Join Tetrate and Venafi for a hands-on workshop focused on service mesh fundamentals and how it addresses the issues of security, observability, traffic management and high availability for microservices-based applications. Whether you are a developer, DevOps engineer, an IT or Security professional, this workshop is designed to equip you with the foundational knowledge, diving into the core concepts of service meshes including sidecars, data...
DevSecOps for Public Sector: A Roadmap...
Join Venafi's session February 1st at 12:45pm ET as part of Carahsoft's DevSecOps Geek Week. During this session Venafi's subject-matter experts will address the following topic, You’ve Deployed Kubernetes. But How Secure & Reliable is it? Cloud-native applications often rely on Kubernetes. No doubt your cloud-native teams are using the world’s leading open-source certificate manager, cert-manager to manage TLS certificates for...
Automating NPEs in Infrastructure-as-Code
Security teams must know what to trust and what not to trust at all times to effectively protect machine identities in dynamic environments. As a result, smart policy enforcement must be automated and embedded into the tools used by application development teams. By shifting machine identity processes left into the pre-production phase and hooking directly into automated DevOps workflows, security teams can regain control over X.509 certificat...
HashiCorp Vault + Venafi: Scaling in Pr...
As agencies continue to migrate to the cloud and adopt DevSecOps practices and tooling, the challenges to protect sensitive data (secrets) and ensure security policies are consistently applied and followed are tougher than ever. Together, Venafi and HashiCorp Vault make it easy for security teams to safeguard secrets and apply consistent policy while enabling development teams to consume those secrets while ensuring compliance. Join us to lear...
Protecting Federal Agencies' Non-Person...
Connected machines and other non-person entities (NPEs) on enterprise networks are becoming more complex and growing in number. Inefficient manual approaches of securing all these NPEs with digital machine identities - keys and certificates - can lead to failures, outages, and breaches—introducing more risk and a higher chance of costly disruptions that stem from administrative bottlenecks and human error. In this webinar, we will look a...
Software Supply Chain: Code-to-Code Combat
Is your agency doing everything it can to protect against foreign interests from hacking the software that it relies on? From third party software libraries to in-house developed applications to PowerShell scripts, code signing is a necessary component to securing your software infrastructure. Code signing is effective at ensuring that the code you execute comes from where it claims to come from and hasn’t been modified by a third party....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.