Cloud-Native Security

Effective enterprise security

  • Cloud-Native Security: Rotate, Repair, Repave — Justin Smith26:52

    Cloud-Native Security: Rotate, Repair, Repave — Justin Smith

    Slides: http://www.slideshare.net/Pivotal/cloud-native-security-rotate-repair-repave Enterprise software security traditionally resists change as a matter of unquestioned policy. Vulnerability is a f

    Watch Video
  • Cloud-Native Security topic page

    Go now
  • How Cloud-Native Platforms Help With Compliance And Security

    How Cloud-Native Platforms Help With Compliance And Security

    In this post, Pivotal’s Cloud-Native expert, Michael Coté, recaps a recent post he wrote in FierceDevOps. While compliance, security, and audits are very annoying processes for many development...

    Read More
  • A More Practical Approach to Encrypting Data In Motion

    A More Practical Approach to Encrypting Data In Motion

    A More Practical Approach to Encrypting Data in MotionJustin Smith, Pivotal’s Chief Security Officer for Product, breaks down encrypting data in motion into a more approachable understanding.It’s...

    Read More
  • May 23 - How to Configure PostgreSQL Consistent with Modern Security Best Practices Webinar

    May 23 - How to Configure PostgreSQL Consistent with Modern Security Best Practices Webinar

    Read More
  • Signal Sciences and Pivotal Cloud Foundry

    Learn More
  • Secure Hybrid Banking Reference Architectures for Cloud-Native Applications

    Secure Hybrid Banking Reference Architectures for Cloud-Native Applications

    Read More
  • Signal Sciences Service Broker

    Signal Sciences Service Broker

    Read More
  • May 3 - Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps Webinar

    May 3 - Strategies on How to Overcome Security Challenges Unique to Cloud-Native Apps Webinar

    Read More
  • Using Data Science for Cybersecurity

    Using Data Science for Cybersecurity

    Watch the video: https://content.pivotal.io/webinars/using-data-science-for-cybersecurity Enterprise networks are under constant threat. While perimeter security can help keep some bad actors out, we

    View Presentation
  • The Three R’s of Enterprise Security: Rotate, Repave, and Repair

    The Three R’s of Enterprise Security: Rotate, Repave, and Repair

    Read More
  • SpringOne2GX 2015 replay: Spring Data REST - Data Meets Hypermedia + Security

    SpringOne2GX 2015 replay: Spring Data REST - Data Meets Hypermedia + Security

    Recorded at SpringOne2GX 2015Presenters: Greg Turnquist & Roy ClarksonData / Integration TrackSlides: http://www.slideshare.net/SpringCentral/spring-data-rest-data-meets-hypermedia-security Check...

    Read More
  • Cloud-Native Roadshow

    Find your city
  • New Security in Apache Geode52:23

    New Security in Apache Geode

    Hear about the new security framework released in Apache Geode 1.0 M3. This framework provides a simplified implementation based on Apache Shiro. Slides: http://www.slideshare.net/PivotalOpenSourceHu

    Watch Video
  • Pivotal Cloud Foundry 1.8 with Jared Ruckle (Ep. 35)

    Pivotal Cloud Foundry 1.8 with Jared Ruckle (Ep. 35)

    This week, we talk with Jared Ruckle about the new Pivotal Cloud Foundry 1.8 release, delving into security, databases, and new services—all aimed at speeding up time to market (with faster...

    Read More
  • Industrial Strength Access Control for Spring Applications — Dariush Amiri, GE Digital31:17

    Industrial Strength Access Control for Spring Applications — Dariush Amiri, GE Digital

    Slides: http://www.slideshare.net/Pivotal/industrial-strength-access-control-for-spring-applications Despite the plethora of open security standards and drafts, there is a dearth of comprehensive sol

    Watch Video
  • Industrial Strength Access Control for Spring Applications

    Industrial Strength Access Control for Spring Applications

    SpringOne Platform 2016 Speaker: Dariush Amiri; Senior Software Architect, GE Digital Despite the plethora of open security standards and drafts, there is a dearth of comprehensive solutions that sat

    View Presentation
  • Migrating to Cloud-Native Application Architectures

    Migrating to Cloud-Native Application Architectures

    Read More
  • How Pivotal Web Services Just Improved The Security Of Your Platform

    How Pivotal Web Services Just Improved The Security Of Your Platform

    How up-to-date are your application environments? When's the last time you updated the operating system or loaded the latest Java runtime? If your team is like most, the answer is "not often...

    Read More
  • Graph Mining For Detecting Coordinated Network Attacks

    Graph Mining For Detecting Coordinated Network Attacks

    In this series of blog posts, Pivotal’s Jin Yu and Anirudh Kondaveeti discuss how data science techniques can be used to detect network security threats. This post introduces the use of graph...

    Read More
  • Sequential Pattern Mining Approach for Watering Hole Attack Detection

    Sequential Pattern Mining Approach for Watering Hole Attack Detection

    As malware techniques continue to evolve, it becomes increasingly challenging to detect network security threats, especially Advanced Persistent Threats (APTs) that are orchestrated by...

    Read More
  • All About The Pivotal Cloud Foundry 1.5 Release

    All About The Pivotal Cloud Foundry 1.5 Release

    The latest and greatest is Pivotal Cloud Foundry release is out! With beta support for things like Diego and Windows 2012, as well as new security features including single sign on, app manager...

    Read More
  • How Lockheed Martin Is Taking On Agile

    How Lockheed Martin Is Taking On Agile

    How does one of the largest defense companies in the world embrace agile development? Lockheed Martin set out with a strong focus on cultural transformation and security. At Cloud Foundry Summit,...

    Read More
  • loading
    Loading More...