Breaking and Building Serverless Application Security
Nov 21, 2021
•
DataDog
Challenges with Building Serverless Applications at Scale
Nov 14, 2021
•
Epsagon
Security Governance and Compliance in Serverless Applications
Nov 7, 2021
•
Seiso
Building Applications with Zero Trust Principles
Oct 31, 2021
•
Figma
Threat Detection and Incident Response in Cloud
Oct 24, 2021
•
Resilience
What is SaaS Security Posture Management (SSPM)?
Oct 21, 2021
•
Resilient Cyber
What is Cloud Native Application Protection (CNAPP)?
Oct 17, 2021
•
Accurics
Implementing Cloud Security Tools the Right way
Oct 10, 2021
•
Dassana
Data Security and it’s Challenges in Cloud
Oct 3, 2021
•
Dasera
Application Security Engineer Skills
Sep 26, 2021
•
Purple
Threat Analyst Skills
Sep 24, 2021
•
Cyberwox Academy
From University to a Security Engineer at Atlassian
Sep 19, 2021
•
Atlassian
Getting an Entry Level GRC Role
Sep 16, 2021
•
Simply Cyber
From Executive Assistant to Head of Security
Sep 12, 2021
•
PagerDuty
Skills needed for an Associate Cloud Security Engineer
Sep 5, 2021
•
Best Buy
Cloud Hacking eSports | Ultimate Hacking Championship
Aug 29, 2021
•
Ultimate Hacking Championship
Network Security in Cloud Native World
Aug 26, 2021
•
AccuKnox
Migrating from Monolith to Cloud Native
Aug 22, 2021
•
CySense
What is a Security Data Lake?
Aug 8, 2021
•
Snowflake
Building Observability Platform for Scale
Aug 3, 2021
•
Atlassian
Cloud Native Security: OpenTelemetry & Tracing Explained
Aug 1, 2021
•
LightStep
What is Cyber Resilience in Cloud?
Jul 25, 2021
•
Resilient Cyber
Managing Threats in AWS using AWS Tools
Jul 21, 2021
•
AWS
Cloud Security RoadMap
Jul 18, 2021
•
Summit Route
Comparing Cloud Security Tools: CWPP vs CSPM vs CASB
Jul 11, 2021
•
Orca Securit
Cloud Infrastructure Security at Scale
Jul 4, 2021
•
Netflix
Podcast Collaboration: Hacker Valley Studio
Jun 27, 2021
•
Hacker Valley Studio
Finding Bugs in Google Cloud
Jun 20, 2021
•
Best Buy
Hacker Stories from the Internet
Jun 13, 2021
•
Darknet Diaries
21 yrs in Cybersecurity: Challenges THEN & NOW
Jun 10, 2021
•
YL Ventures
Finding and Fixing Security Bugs in Google Cloud
Jun 6, 2021
•
Truffle Security
Attacking and Defending Managed Kubernetes Clusters
May 30, 2021
•
Darkbit
Kubernetes Runtime Threat Detection and Response – Falco, Sysdig
May 23, 2021
•
sysdig
Start here for Kubernetes Security
May 16, 2021
•
Trend Micro
Risk Analysis of Kubernetes Security
May 9, 2021
•
Snowflake
Kubernetes (Goat) Vulnerable by Design
May 2, 2021
•
Miro
CISO PERSPECTIVE SERIES: LINKEDIN CISO
Apr 25, 2021
•
Linkedin
Building Threat Detection for your Cloud Environment
Apr 18, 2021
•
Microsoft
Cloud Governance using Infrastructure as Code
Apr 11, 2021
•
env0
Kubernetes Security Explained for those starting today!
Apr 5, 2021
•
Google Cloud
Getting Infrastructure as Code (IaC) Security Culture right!
Mar 28, 2021
•
Indeni
Azure Security Best Practices for Cloud Architects
Mar 21, 2021
•
John Savill
Infrastructure as Code Security
Mar 14, 2021
•
Bridgecrew
INCIDENT RESPONSE IN AWS CLOUD
Mar 7, 2021
•
AWS
How to become a Cloud Security Engineer
Feb 28, 2021
•
ByteChek
Kubernetes Security at Scale in A CI/CD Pipeline
Feb 21, 2021
•
refactr
Container Security for AWS
Feb 14, 2021
•
Falcon’s View Consulting
CISO Challenges in 2021
Feb 10, 2021
•
Signal Sciences
Cloud Security in $25 Billion dollar Company
Feb 7, 2021
•
Siemens USA
Security Chaos Engineering Experiments for Beginners
Jan 31, 2021
•
Capital One
Red Team in Cloud
Jan 24, 2021
•
Atlassian
What is Infrastructure as Code Security?
Jan 17, 2021
•
BridgeCrew
Cloud Security Testing in AWS
Jan 10, 2021
•
Securing
How to become a Cloud Security Architect in 2021
Jan 3, 2021
•
United Airlines