Slides: http://www.slideshare.net/Pivotal/cloud-native-security-rotate-repair-repave Enterprise software security traditionally resists change as a matter of unquestioned policy. Vulnerability is a function that changes with time. The probability of being exploited increases with the accumulation of long lived credentials and unpatched code. The question that must be asked is: how can a security strategy which resists change keep up with the pace of the modern threat landscape? This asymmetry in speed and adaptiveness only creates advantages for the attacker. What if the only what to increase security is to move as fast as possible? Continuously rotating credentials, patching systems, and rebuilding clusters to minimize windows of vulnerability decreases the threat profile in time and severity. This presentation will outline principles and practices of Cloud-Native Security and how Cloud Foundry can be part of your strategy to increase velocity and security.implementation and scale it up in stages, splitting out backend resources and authentication to separate services. Speaker: Justin Smith, Pivotal
A Data Science Approach to Detecting Insider Security Threats
In my conversations with CISOs, one of their biggest fears is insider threat attack. Employees must access ...
Security 101Learn More
Related content in this Stream
Take Application Security to the Next Level with Data Science (Ep. 77)
In this episode of Pivotal Insights, Pivotal's Rashmi Raghu and Brendan Higgins join talk about using data science and analytics to catch potentially malicious user behavior on corporate networks.
Aug 15 - Enhance Application Security with Automated, Open-Source, Security Management Webinar
Ensuring Platform Security with Windows Bosh Add-ons and Runtime-Config at Boeing
Ensuring Platform Security with Windows Bosh Add-ons and Runtime-Config at Boeing - James Coppock & Sheryl Maris, Boeing We did it! InfoSec said “Not a chance you’re deploying Ubuntu and Windows on P
Merrill: The Most Important Company You've Never Heard Of
A cloud-native approach to software can give you speed without sacrificing security. Learn how Merrill Corporation worked with Pivotal to adopt this modern way of working. https://pivotal.io/customer
Using VMware’s Harbor with PKS (and Why Kubernetes Needs a Container Registry)
Container registries add important security features to Kubernetes. This post details how Harbor, part of Pivotal Container Service, helps secure Docker images in PKS deployments.
New Tech Papers: Won’t Someone Please Think of the Auditors? Plus, How to do Chargeback & Showback in PCF
Pivotal recently published several new whitepapers: The Auditor's Guide to PCF, Security & Compliance for PCF, and Chargebacks & Showbacks in PCF. This post review the highlights of each paper.
Security and Compliance with Pivotal Cloud Foundry
A Primer on PCI Compliance with Pivotal Cloud Foundry
Enterprise Architects, It's Time to Learn How the CredHub Service Broker Applies the Principle of Least Privilege to Your Secrets.
The CredHub Service Broker is now a beta. It's a service broker that helps developers secure off-platform service credentials. We examine the tile from the enterprise architect perspective.
Need to Secure Credentials for Off-Platform Services in PCF? Try the CredHub Service Broker, Now in Beta! We Take an Inside Look.
Pivotal released the CredHub Service Broker as a beta. It's a service broker that helps developers secure off-platform service credentials with CredHub. Read about the new tile here.
What is Cloud-Native Security?
Security has not operated at the speed of software innovations in the last few decades. Learn how a cloud-native security approach can enable your team to succeed and stay safe against modern threats.
Why cloud-native enterprise security matters, Matt Stine (Pivotal)
The types of threats facing the enterprise are relatively well understood—malware, advanced persistent threats, and leaked credentials—which are typically addressed by slowing the rate of change, beca
Secure All the Services! How Banks Use Pivotal Cloud Foundry and the Open Service Broker API to Make It Happen.
Banks of all sizes are modernizing how they do IT and software development. This blog series explores how banks use Pivotal Cloud Foundry to secure backing services for apps.
For Banks, Securing Modern Apps Starts with Identity & Access Management. Here's How PCF Helps the Largest Firms Reduce Risk.
Banks of all sizes are modernizing how they do IT and software development. This blog series explores how banks use Pivotal Cloud Foundry to secure their cloud-native applications.
Cloud-Native Java from the Source
Improve Security and Developer Productivity with Service Instance Sharing in PCF 2.1
PCF 2.1 introduces a new capability that enables multiple development teams working on separate microservices to access the same backing services while maintaining robust security and access controls.
Refocusing Security in the DevOps Era: Enabling "Secure by Default"
Security Processes and Culture, with Molly Crowther (Ep. 96)
Security is more about finding holes and devising patches. For one, once you find those holes and have a patch, you have to make sure everyone not only knows about them, but applies them.
Baked-in Platform Security Targets Pathways to Exploitation
How Synchrony Financial adopted Pivotal Cloud Foundry and reshaped how they approach product security.Synchrony Financial isn’t a new kid on the block. The company, which specializes in private...
Steeltoe Turns 2.0, Adds Support for ASP.NET Core 2.0, CredHub, and a SQL Server Connector