• Customers
  • Docs
  • Pricing
  •  
  • Sign in
  • Get started

Strange Loop 2019 liveblog

Strange Loop 2019 - Securing cloud applications and their credentials

Blogy McBlogerson on September 14, 2019

Srdjan Grubor


Overview

With the rise of containerized cloud-based infrastructure, security in these architectures has been an area that has been often deferred to developers and "shadow IT" because the tools and technologies used previously have have not been as quick to catch up. While developers generally make reasonable decisions about securing workloads, pushes for higher velocity end up causing simple implementation misconfigurations that exponentially increase the attack surface. Attendees will learn common container security problems as well as how to increase security of your apps both on the container and scheduler level. We will also cover some of the next-gen tooling and see where long-term security initiatives are heading in this space.


AWESOME LIVEBLOG CONTENT HERE!

About Sourcegraph

  • Case studies
  • Customers
  • Pricing
  • Not a developer?

Resources

  • Blog
  • Changelog
  • Documentation
  • Podcast
  • Big code survey

Company

  • About
  • Careers
  • Contact
  • Handbook
  • News
  • Sourcegraph strategy
  • © 2021 Sourcegraph
  • Terms
  • Security
  • Privacy