InfoQ Homepage Virtual Events Content on InfoQ
-
Building Applications from Edge to Cloud
The panelists discuss the benefits and limitations of edge technologies and how to adopt them in existing applications and deployments.
-
DevSecOps Best Practices for Identity & Access Management
The panelists discuss how to integrate security into DevOps, where their concerns are and how each is addressed.
-
Making Sense of Application Security
Adib Saikali provides a roadmap for application developers and architects to master application security, identifying the security skills needed as an application developer.
-
Cloud-Native Application Security: Your Attack Surface Just Got Bigger
Brian Vermeer shows common threats, vulnerabilities, and misconfiguration including the recently disclosed issues in Log4j, including actionable remediation and best practices.
-
Cloud DevSecOps in Practice: People, Processes and Tools
The panelists discuss how to get the right security, DevOps, and cloud engineering stakeholders together to build a realistic DevSecOps strategy.
-
Maintaining Software Quality with Microservices
The panelists discuss what microservices are, why companies are making the transition, how to identify the challenges when planning the move to microservices, and best practices for software quality.
-
Pivoting and Exploitation in a Docker Environment
Filipi Pires discusses different ways that exist in working with a single form of pivot and how to overcome different obstacles in different networks within this “new” environment called Docker.
-
The Top Five Challenges of Running a Service Mesh in an Enterprise
Christian Posta takes a look at some of the common challenges organizations face when adopting service mesh and how to overcome them.
-
Container Security and Observability in Kubernetes Environments
The panelists discuss how to take care of the security and monitoring of Kubernetes.
-
Securing the Development & Supply Chain of Open Source Software (OSS)
David Wheeler discusses how OSS is developed & distributed as a supply chain (SC) model, how OSS developers can develop & distribute secure OSS today, and how potential users can select secure OSS.
-
Cloud Native Continuous Delivery on Kubernetes with Tekton
Jerop Kipruto introduces the building blocks of Tekton and shows how they fit with Kubernetes. Then she demonstrates how Tekton works and how to use it in an end-to-end continuous delivery process.
-
Scaling Cloud-Native Applications
Jim Walker, Yan Cui, Colin Breck, Liz Fong-Jones, and Wes Reisz look at lessons from scaling applications and things that may go wrong.