Webinar

Our weekly webinars cover the latest developments and trends in Kubernetes security and observability.

June 28, 2022
Prevent a potential DDoS Attack with Application-Layer Security Controls
Americas
10:00 am 11:00 am PDT
Layer 7 refers to the top layer in the 7-layer OSI Model of the Internet. It is also known as the “application layer.” It’s the top layer of the data processing that occurs just below the surface or behind the scenes of the software applications that users interact with. The...
June 21, 2022
Auditing cloud-native applications for security risks and misconfigurations
Americas
10:00 am 11:00 am PDT
According to the NSA, misconfiguration is the most common cloud security vulnerability. Misconfigurations of environments and images are one of the top concerns for security and DevOps teams. Cloud-native misconfigurations occur when resources have not been configured properly, versions are mismatched, tech stack is not updated leaving your application vulnerable...
June 14, 2022
Container Security Basics – Image Assurance
Americas
10:00 am 11:00 am PDT
As you or your team transition to building applications using containers it is easy to look past the first security lapse, vulnerabilities in the container image. Some of the recent cyber attacks are proof that there is a big attack surface in Kubernetes and container environments that need to be...
May 24, 2022
5 ways to get full-stack observability for containers and Kubernetes
Americas
10:00 am 11:00 am PDT
There’s a very symbiotic relationship between observability and security, and whether you’re responding to a security incident or troubleshooting an application, having the right platform enriched with Kubernetes-specific context is invaluable. This webinar will show you how to get full-stack observability into your containers and Kubernetes environment using Calico Cloud....
May 3, 2022
Avoid Compliance Pitfalls: Design a well-defined label schema to ensure continuous compliance for containers
Americas
10:00 am 11:00 am PDT
In this security & compliance webinar, we will outline some best practices to ensure workload compliance for containers is met, while avoiding the usual pitfalls when enforcing labels after the workload is deployed into Kubernetes. This 1 hour webinar will cover the below topics: What are labels? And why should...
May 17, 2022
What’s new with Calico Enterprise 3.14?
Americas
10:00 am 11:00 am PDT
We are excited to announce new features and capabilities for Calico Enterprise including: Support for Calico CNI with AKS Support for RKE2 (Rancher Kubernetes Engine version2) New and Improved Dashboards with Calico UI With these new enhancements and support, users can now install Calico with AKS as part of the...
May 10, 2022
5 compliance questions to ask security experts for cloud-native applications
Americas
10:00 am 11:00 am PDT
Join our Customer Success Leader to learn how to engage with a technology partner and ask right questions to get your cloud-native applications PCI or SOC2 compliant running regulated workloads. He will share real-world examples and a demo application to walk you through a successful compliance initiative within an organization....
April 26, 2022
Auditing cloud-native applications for security risks and misconfigurations
Americas
10:00 am 11:00 am PDT
According to the NSA, misconfiguration is the most common cloud security vulnerability. Misconfigurations of environments and images are one of the top concerns for security and DevOps teams. Cloud-native misconfigurations occur when resources have not been configured properly, versions are mismatched, tech stack is not updated leaving your application vulnerable...
April 21, 2022
Best practices for zero-trust workload security on EKS clusters
Americas
10:00 am 11:30 am PDT
Cloud security teams are focussing on building and maintaining a zero-trust model to secure access to their critical data and protect workloads from malware. As most enterprises operate in a hybrid or multi-cloud model, controlling egress traffic for workloads is a key step towards building a zero-trust environment. Calico and...
April 12, 2022
Protecting modern cloud-native applications from network-based threats with runtime security
Americas
10:00 am 11:00 am PDT
As security teams are taking a breather after patching and fixing their systems for the Log4shell vulnerability, the next threat is not too far. These cyber attacks will continue to happen and as long as organizations ramp up their security, precious time and effort will be lost in finding and...