Filter & Sort
  1. Why we need a unified approach to Kubernetes environments

    Tired of Kubernetes networking chaos? Discover why fragmented tools lead to operational overhead, hidden costs, and security gaps. Learn how a unified approach to Kubernetes networking and security eliminates tool sprawl, enhances threat detection, and drives better outcomes for your modern applications.

  2. Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

    Modern software supply chains face increasing complexity and risk, especially from supply chain attacks like SUNBURST. This article explores how Sigstore and Teleport's Machine & Workload Identity can fortify your CI/CD pipeline. Learn how Sigstore enables keyless, verifiable artifact signing, and how Teleport integrates these signatures into workload attestation using SPIFFE-based SVIDs. Discover how to enforce policies that block compromised containers from accessing sensitive resources, and how cryptographic identity can replace static secrets for secure service-to-service communication. A must-read for DevSecOps teams aiming to embed security into the development lifecycle.

  3. Zebra Technologies Cuts SCA Noise by 97% with Endor Labs

    Discover how Zebra Technologies transformed its Product Security by adopting Endor Labs, slashing SCA alert noise by an astounding 97% and reducing remediation effort by over 60%. Learn how they achieved accurate risk prioritization and boosted developer buy-in for a truly proactive security model.

  4. Zero Trust Authorization for Non-Human Identities: A Deep Dive with Cerbos' Alex Olivier

    Explore non-human identity growth with Cerbos’ CPO Alex Olivier. Learn how Cerbos empowers zero-trust, real-time authorization for AI agents, IoT devices, and workloads.

  5. Zitadel goes beyond basic authentication into threat intelligence & analysis of authentication data

    Florian Forster, CEO & Co-Founder, Zitadel, joins us in this episode to discuss the challenges of authentication in cloud-native and Kubernetes environments, such as managing token expiration, revocation, and scalability.

  6. Zscaler to Transform AI-Driven Security Operations with Red Canary Acquisition

    Zscaler expands its AI-driven security operations with the Red Canary acquisition, following Canonic Security and Trustdome.

  7. ​Is Real-time Adaptive Security the Future of Data Integrity and Security

    Explore how real-time adaptive security, powered by AI and machine learning, is shaping the future of data integrity and cybersecurity.

Items 409 to 415 of 415 total

Show per page