Cloud-Native Security

Effective enterprise security

  • Cloud-Native Security: Rotate, Repair, Repave — Justin Smith26:52

    Cloud-Native Security: Rotate, Repair, Repave — Justin Smith

    Slides: http://www.slideshare.net/Pivotal/cloud-native-security-rotate-repair-repave Enterprise software security traditionally resists change as a matter of unquestioned policy. Vulnerability is a f

    Watch Video
  • Cloud-Native Security topic page

    Go now
  • Cloud-Native Security: Rotate, Repair, Repave

    Cloud-Native Security: Rotate, Repair, Repave

    SpringOne Platform 2016 Speaker: Justin Smith; Director, Pivotal Enterprise software security traditionally resists change as a matter of unquestioned policy. Vulnerability is a function that changes

    View Presentation
  • How Cloud-Native Platforms Help With Compliance And Security

    How Cloud-Native Platforms Help With Compliance And Security

    In this post, Pivotal’s Cloud-Native expert, Michael Coté, recaps a recent post he wrote in FierceDevOps. While compliance, security, and audits are very annoying processes for many development...

    Read More
  • Using Data Science for Cybersecurity

    Using Data Science for Cybersecurity

    Watch the video: https://content.pivotal.io/webinars/using-data-science-for-cybersecurity Enterprise networks are under constant threat. While perimeter security can help keep some bad actors out, we

    View Presentation
  • The Three R’s of Enterprise Security: Rotate, Repave, and Repair

    The Three R’s of Enterprise Security: Rotate, Repave, and Repair

    Read More
  • SpringOne2GX 2015 replay: Spring Data REST - Data Meets Hypermedia + Security

    SpringOne2GX 2015 replay: Spring Data REST - Data Meets Hypermedia + Security

    Recorded at SpringOne2GX 2015Presenters: Greg Turnquist & Roy ClarksonData / Integration TrackSlides: http://www.slideshare.net/SpringCentral/spring-data-rest-data-meets-hypermedia-security Check...

    Read More
  • New Security in Apache Geode52:23

    New Security in Apache Geode

    Hear about the new security framework released in Apache Geode 1.0 M3. This framework provides a simplified implementation based on Apache Shiro. Slides: http://www.slideshare.net/PivotalOpenSourceHu

    Watch Video
  • Pivotal Cloud Foundry 1.8 with Jared Ruckle (Ep. 35)

    Pivotal Cloud Foundry 1.8 with Jared Ruckle (Ep. 35)

    This week, we talk with Jared Ruckle about the new Pivotal Cloud Foundry 1.8 release, delving into security, databases, and new services—all aimed at speeding up time to market (with faster...

    Read More
  • Industrial Strength Access Control for Spring Applications — Dariush Amiri, GE Digital31:17

    Industrial Strength Access Control for Spring Applications — Dariush Amiri, GE Digital

    Slides: http://www.slideshare.net/Pivotal/industrial-strength-access-control-for-spring-applications Despite the plethora of open security standards and drafts, there is a dearth of comprehensive sol

    Watch Video
  • Industrial Strength Access Control for Spring Applications

    Industrial Strength Access Control for Spring Applications

    SpringOne Platform 2016 Speaker: Dariush Amiri; Senior Software Architect, GE Digital Despite the plethora of open security standards and drafts, there is a dearth of comprehensive solutions that sat

    View Presentation
  • Cloud-Native Roadshow

    Find your city
  • Migrating to Cloud-Native Application Architectures

    Migrating to Cloud-Native Application Architectures

    Read More
  • How Pivotal Web Services Just Improved The Security Of Your Platform

    How Pivotal Web Services Just Improved The Security Of Your Platform

    How up-to-date are your application environments? When's the last time you updated the operating system or loaded the latest Java runtime? If your team is like most, the answer is "not often...

    Read More
  • Graph Mining For Detecting Coordinated Network Attacks

    Graph Mining For Detecting Coordinated Network Attacks

    In this series of blog posts, Pivotal’s Jin Yu and Anirudh Kondaveeti discuss how data science techniques can be used to detect network security threats. This post introduces the use of graph...

    Read More
  • Sequential Pattern Mining Approach for Watering Hole Attack Detection

    Sequential Pattern Mining Approach for Watering Hole Attack Detection

    As malware techniques continue to evolve, it becomes increasingly challenging to detect network security threats, especially Advanced Persistent Threats (APTs) that are orchestrated by...

    Read More
  • All About The Pivotal Cloud Foundry 1.5 Release

    All About The Pivotal Cloud Foundry 1.5 Release

    The latest and greatest is Pivotal Cloud Foundry release is out! With beta support for things like Diego and Windows 2012, as well as new security features including single sign on, app manager...

    Read More
  • How Lockheed Martin Is Taking On Agile

    How Lockheed Martin Is Taking On Agile

    How does one of the largest defense companies in the world embrace agile development? Lockheed Martin set out with a strong focus on cultural transformation and security. At Cloud Foundry Summit,...

    Read More
  • Conjectur Joins with Pivotal to Amplify Technology, Security

    Read More
  • VMware Project Lightwave Targets Containerised App Security Concerns

    VMware Project Lightwave Targets Containerised App Security Concerns

    Read More
  • Security Pros Name Their Must-Have Tools

    Security Pros Name Their Must-Have Tools

    Read More
  • Build Newsletter: Predictions, Security, Mobile, Agile, & DevOps – January 2015

    Build Newsletter: Predictions, Security, Mobile, Agile, & DevOps – January 2015

    “Build” is the monthly newsletter from Pivotal that provides a snapshot of the most relevant news and trends for architects and developers. This month we look at 2014 year-end reviews and 2015...

    Read More
  • loading
    Loading More...