Please log in to watch this conference skillscast.
Zero-day exploits are a regular part of complex systems. How would you survive the next Heartbleed? Do you know what libraries you are running in production? If a vulnerability is exploited, can data be exfiltrated? Container technologies make it easier for you to avoid becoming the next Equifax. In this talk, Luke will share with you how to secure applications in high-compliance environments. He will explore security testing, metadata management, and Grafeas - a Google-sponsored artefact tracking tool. You will learn how to lock down applications and networks, enforce deployment policies, and secure applications from tomorrow's threats.
YOU MAY ALSO LIKE: