Containers Trend Report. Explore the current state of containers, containerization strategies, and modernizing architecture.
Securing Your Software Supply Chain with JFrog and Azure. Leave with a roadmap for keeping your company and customers safe.
WEBINAR TUE, JUN 20 @ 1PM ET
Software supply chains have become the most valuable part of all software development lifecycles. They have also become a target for attack, and that means that the software we develop for our customers can be at risk if we don’t ensure they are secure. Building your software supply chain on Azure can make your supply chain easier to manage, more scalable, and more secure. Join us as we walk through how to start building your supply chain today and leave with a roadmap for keeping your company and customers safe!
Presented by JFrog
Register NowWEBINAR TUE, JUN 22 @ 1PM ET
As companies and their development teams grow, the number of places software is generated and consumed naturally increases. The rise of microservice architectures has increased the speed of delivering new capabilities but also the complexity of ensuring all services work together. Because of these trends, organizations should provide reliable access to required software packages and artifacts for teams collaborating across time zones and services. Join us for a webinar with JFrog's Solutions Engineering Manager, Richard Clark, where he will guide attendees through the core tenets of mastering distributed DevSecOps.
Presented by JFrog
Register NowWEBINAR WED, JUN 28 @ 1PM ET
Automating systems like CI/CD processes have enabled engineers to ship code more quickly, but this change has also created multiple new avenues for attackers to reach production assets. From bypassing branch protection rules to more complex attack scenarios like Poisoned Pipeline Execution - attackers have found that CI/CD is a quick way to invoke malicious attacks on production environments and gain control. This talk will walk you through some of the more common (and complex!) attack scenarios in CI/CD pipelines, and what you can do to ensure your delivery pipeline doesn't become the entry point for attackers.
Presented by Prisma Cloud by Palo Alto Networks
Register NowABOUT US
ADVERTISE
CONTRIBUTE ON DZONE
LEGAL
CONTACT US