Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Adopt open source securely from bare metal to cloud

It’s no secret that developers prefer to use open-source software in their projects. However, the Log4Shell attack or the more recent PyPl crypto miner packages have taught us that there are questions around how it should be managed. At Canonical we have been dealing with open-source security issues since the very first release of Ubuntu and way before the topic became number 1 on every CISO priority list. In this video, our team discusses how your company can manage these challenges and lay the software foundation of a successful cybersecurity program.

Open source security: best practices for early detection & risk mitigation

What knowledge, tools, and processes do you need to keep your open-source software free from vulnerabilities and threats? Many open-source projects are well-maintained by software vendors or individuals. Yet, studies show that 80% of codebases used by enterprises contain vulnerabilities (half of which are high-risk vulnerabilities that can be exploited). Hackers scan for outdated systems that contain vulnerabilities, which they then exploit by deploying targeted malware. In this webinar, we will discuss best practices for keeping your systems up to date.

AWS re:Invent 2022 - Ubuntu and beyond: Securely managing open source on AWS

More and more companies are using open source. But how should it be secured? Similar or more urgent questions arise in the container world. Canonical is committed to securing open-source applications with not only Ubuntu but also a host of open-source applications for output (NGINX and Apache), runtime (Go, Node.js, and PHP), messaging (Kafka and RabbitMQ), data (MySQL, PostgreSQL, and Memcached) and observability and utilities (Prometheus and Grafana).

Security and real-time Linux in a shifting automotive world

Software is completely changing the automotive industry - from vehicle design to use and maintenance. The whole lifecycle now relies on software and vehicles resembling “computers on wheels”. But vehicles aren’t regular devices like smartphones. They move humans at hundreds of kilometers per hour and need to be safe and secure at all times. When there is software involved, there are always security vulnerabilities. No cybersecurity expert can say the opposite. How can the automotive industry navigate the shift towards software-defined vehicles while ensuring the best level of security?

AI retail solutions: Market basket analysis

Retail is being reinvented by Artificial intelligence, and Machine Learning and retailers are challenged to respond to customers’ needs and preferences. From personalised promotions to inventory management, there is a wide spectrum of ai use cases in retail that are addressed by technological innovations. It is an industry that is rich in data, and more than using it to connect dots, machine learning retail solutions needs to gather insights to offer a better experience and retain clients.