Cloud-Native SecurityLearn More
Related content in this Stream
Introduction to CDD and Security Centric System Design - Dmitry Didovicher, Crunchy Data
In security centric environments, such as Federal and State Government or large enterprises, even the most mature DevOps teams find themselves unable to deliver value due to complex compliance require
Healthy Agile Product Security - Molly Crowther
When people think of product security, they think of an enforcer telling them "no" or "don't do that" or "I'm suprised you didn't know that". At Cloud Foundry, we're trying to improve product security
Security and Compliance with Pivotal Cloud Foundry
What is Cloud-Native Security?
Security has not operated at the speed of software innovations in the last few decades. Learn how a cloud-native security approach can enable your team to succeed and stay safe against modern threats.
Building Capital Markets Risk Applications
Why cloud-native enterprise security matters, Matt Stine (Pivotal)
The types of threats facing the enterprise are relatively well understood—malware, advanced persistent threats, and leaked credentials—which are typically addressed by slowing the rate of change, beca
Next Generation OAuth Support with Spring Security 5.0 - Joe Grandja
Spring Security 5.0 introduces new support for the OAuth 2.0 Authorization Framework and OpenID Connect 1.0. This talk will provide a detailed overview of the new OAuth 2.0 Login feature, which provi
Enable Authentication and Authorization with Azure Active Directory - Yawei Wang, Microsoft
Struggling to wire up enterprise grade authentication and authentication for your Spring Boot apps? In this live coding session, see how you can use Spring Security to enable Azure Active Directory au
Spring Security 5: The Reactive Parts - Rob Winch
The continued growth of Internet of Things (IoT) and mobile has forced applications to scale in unprecedented ways. The desire to easily scale an application has also moved many applications onto Infr
CredHub and Secure Credential Management - Peter Blum, Scott Frederick
From the platform all the way down to the microservices which run upon it, secrets are everywhere and leaking them can be a costly experience. Understanding security best practices, such as encrypting
Ensuring Platform Security with Windows Bosh Add-ons - Maris, Schaefbauer, Coppock, Boeing
"We did it! InfoSec said “Not a chance you’re deploying Ubuntu and Windows on Pivotal Cloud Foundry unless you meet our highly stringent requirements!”. We were told – “You must implement virus protec
Cloud Foundry UAA as an Identity Gateway - Sree Tummidi
In this session we will cover the capabilities of Cloud Foundry’s UAA which make it apt to be used as an identity gateway for both ingress and egress security patterns. We will take a closer look at
Immutability for PCF: Security in a Cloud Native World - Tom Gillis, Bracket Computing
Bracket Computing has been working closely with the Cloud Foundry community to create new tools to harden a PCF foundation and make it truly immutable. Bracket has developed a unique architecture that
Pivotal Cloud Foundry and Cloud-Native Security
A look at what Cloud-Native Security means to Pivotal as well as how the Pivotal Cloud Foundry suite delivers on those promises today and in the future.
Security: The Offensive Line of Enterprise
It’s time to rethink classic approaches to security, and build a playbook that ensures safety and success.Ask any football player, watch any game — the offense of a team lives and dies with its...
Vulnerability Management at Scale: A Talk with Pivotal’s Technical Program Manager of Security
Can Banks Stop Cyber Criminals?
Financial institutions can thwart intrusions with a two-pronged strategy of brute-force work and cutting-edge tools.A robber goes into a bank with a note and steals a few thousand dollars. An...
Detecting Risky Assets in an Organization Using Time-Variant Graphical Model
Insider Threat Detection: Detecting Variance in User Behavior using an Ensemble Approach
Insider threat detection is a topic of growing interest these days due to the increasing number of cyber attacks. Understanding user activity is crucial to detect malicious insiders.
Cloud-Native Security & the Three R's, with Justin Smith (Ep. 68)