An example of how we can audit and detect anomalous activity in a microservices application running in Docker and Kubernetes using container runtime security.
This is how we can perform forensics and postmortem analysis after someone hacking into our container and downloading some malware. In this case was a Wordpress instance running on Docker in Kubernetes.
A traditional security policy model doesn’t work with containers. The hard part is applying those policies to different containers as they change in your infrastructure. We need a security policy model that can adapt dynamically to orchestration platforms like Kubernetes and Cloud Native apps.
Auditing and logging automatically any command execution being run across your distributed environment is a must for container security best practices.
What should be the role of IT ops in the new modern, hybrid, multi-cloud, cloud native world. Join Jason Bloomberg, president of analyst firm Intellyx, and Darren Cunningham, vice president, marketing from OpsRamp, as they discuss the new skills, approaches, and strategies that ops teams will require in this new world.
Greg Poirier Sensu SVP of Engineering and Anna Plotkin Sensu Director of Product chat about the Sensu product roadmap; Enterprise 3.3 release, the upcoming Sensu Go GA release.
This summer, our awesome Pandas took BigPanda around the world in 80 days...or so. Come, relive our journey with us, before you lose yourself in winter’s cold embrace!
For the first time, our product management team came together from around the world to learn, share, and collaborate across teams at our inaugural Product Management Craft Conference. See what unfolded and hear more about Atlassian's approach to product management.
Learn how on-demand dog walking service WAG uses Sumo Logic as a single pane of glass to monitor and troubleshoot issues across their servers and applications to optimize its website performance and availability.