Parent directory/ | - | - |
12 Essential Requirements for Policy Enforcement and Governance with OSCAL - Robert Ficcaglia.eng.srt | 75.8 KiB | 2023 Feb 05 15:53 |
12 Essential Requirements for Policy Enforcement and Governance with OSCAL - Robert Ficcaglia.mp4 | 40.5 MiB | 2023 Feb 08 00:27 |
84 The Four Golden Signals of Security Observability - Duffie Cooley, Isovalent.eng.srt | 28.2 KiB | 2023 Feb 05 15:51 |
84 The Four Golden Signals of Security Observability - Duffie Cooley, Isovalent.mp4 | 13.1 MiB | 2023 Feb 08 00:27 |
A Sneak Peak Into Security Reviews with the Community - Ragashree MC, Carnegie Mellon University.eng.srt | 33.3 KiB | 2023 Feb 05 16:01 |
A Sneak Peak Into Security Reviews with the Community - Ragashree MC, Carnegie Mellon University.mp4 | 16.3 MiB | 2023 Feb 08 00:27 |
Avoiding IAC Potholes with Policy Cloud Controllers - Andrew Martin, ControlPlane.eng.srt | 62.9 KiB | 2023 Feb 05 15:51 |
Avoiding IAC Potholes with Policy Cloud Controllers - Andrew Martin, ControlPlane.mp4 | 43.8 MiB | 2023 Feb 08 00:27 |
Beyond Cluster-Admin Getting Started with Kubernetes Users and Permissions - Tiffany Jernigan.eng.srt | 51.6 KiB | 2023 Feb 05 15:47 |
Beyond Cluster-Admin Getting Started with Kubernetes Users and Permissions - Tiffany Jernigan.mp4 | 41.3 MiB | 2023 Feb 08 00:27 |
CNI or Service Mesh Comparing Security Policies Across Providers - Rob Salmond & Christine Kim.eng.srt | 59.7 KiB | 2023 Feb 05 15:55 |
CNI or Service Mesh Comparing Security Policies Across Providers - Rob Salmond & Christine Kim.mp4 | 32.9 MiB | 2023 Feb 08 00:27 |
CSI Container Can You DFIR It - Alberto Pellitteri & Stefano Chierici, Sysdig.eng.srt | 61.5 KiB | 2023 Feb 05 16:00 |
CSI Container Can You DFIR It - Alberto Pellitteri & Stefano Chierici, Sysdig.mp4 | 38.9 MiB | 2023 Feb 08 00:27 |
Cloud Native Security 101 Building Blocks, Patterns and Best Practices - Rafik Harabi, Sysdig.eng.srt | 55.9 KiB | 2023 Feb 05 15:47 |
Cloud Native Security 101 Building Blocks, Patterns and Best Practices - Rafik Harabi, Sysdig.mp4 | 40.5 MiB | 2023 Feb 08 00:27 |
Cloud Native Security Landscape Myths, Dragons, and Real Talk.eng.srt | 78.1 KiB | 2023 Feb 05 15:47 |
Cloud Native Security Landscape Myths, Dragons, and Real Talk.mp4 | 59.8 MiB | 2023 Feb 08 00:27 |
Container Factory for Aerospace & Defense Enterprises - Sarah Miller & Melissa Robertson.eng.srt | 55.7 KiB | 2023 Feb 05 15:51 |
Container Factory for Aerospace & Defense Enterprises - Sarah Miller & Melissa Robertson.mp4 | 25.8 MiB | 2023 Feb 08 00:27 |
Container Patching Making It Less Gross Than the Seattle Gum Wall - Greg Castle & Weston Panther.eng.srt | 80.6 KiB | 2023 Feb 05 15:59 |
Container Patching Making It Less Gross Than the Seattle Gum Wall - Greg Castle & Weston Panther.mp4 | 40.8 MiB | 2023 Feb 08 00:27 |
Cryptographic Agility Preparing Modern Apps for Quantum Safety and Beyond - Natalie Fisher, VMware.eng.srt | 43.1 KiB | 2023 Feb 05 15:38 |
Cryptographic Agility Preparing Modern Apps for Quantum Safety and Beyond - Natalie Fisher, VMware.mp4 | 30.0 MiB | 2023 Feb 08 00:27 |
Delivering Secure Healthcare Applications with OSS - Robert Wood & Gedd Johnson.eng.srt | 74.8 KiB | 2023 Feb 05 16:00 |
Delivering Secure Healthcare Applications with OSS - Robert Wood & Gedd Johnson.mp4 | 44.7 MiB | 2023 Feb 08 00:27 |
Demystifying Zero-Trust for Cloud Native Technologies.eng.srt | 60.8 KiB | 2023 Feb 05 15:46 |
Demystifying Zero-Trust for Cloud Native Technologies.mp4 | 53.3 MiB | 2023 Feb 08 00:27 |
Do This, Not That - Lessons from 7 Headline Grabbing Security Breaches - Maya Levine, Sysdig.eng.srt | 56.7 KiB | 2023 Feb 05 15:56 |
Do This, Not That - Lessons from 7 Headline Grabbing Security Breaches - Maya Levine, Sysdig.mp4 | 29.1 MiB | 2023 Feb 08 00:27 |
Finding the Needles in a Haystack Identifying Suspicious Behaviors Jeremy Cowan & Wasiq Muhammad.eng.srt | 55.2 KiB | 2023 Feb 05 15:50 |
Finding the Needles in a Haystack Identifying Suspicious Behaviors Jeremy Cowan & Wasiq Muhammad.mp4 | 32.5 MiB | 2023 Feb 08 00:27 |
From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native - Mor Weinberger.eng.srt | 44.3 KiB | 2023 Feb 05 15:49 |
From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native - Mor Weinberger.mp4 | 24.8 MiB | 2023 Feb 08 00:27 |
From the Cluster to the Cloud Lateral Movements in Kubernetes - Yossi Weizman & Ram Pliskin.eng.srt | 60.4 KiB | 2023 Feb 05 15:49 |
From the Cluster to the Cloud Lateral Movements in Kubernetes - Yossi Weizman & Ram Pliskin.mp4 | 31.8 MiB | 2023 Feb 08 00:27 |
Get Your Security Priorities Straight How to Identify Workloads Und Ben Hirschberg & Arie Haenel.eng.srt | 44.3 KiB | 2023 Feb 05 15:49 |
Get Your Security Priorities Straight How to Identify Workloads Und Ben Hirschberg & Arie Haenel.mp4 | 24.4 MiB | 2023 Feb 08 00:27 |
Good Fences Make Good Neighbors Making Cross-Namespace References More Secure with Re Nick Young.eng.srt | 77.0 KiB | 2023 Feb 05 15:57 |
Good Fences Make Good Neighbors Making Cross-Namespace References More Secure with Re Nick Young.mp4 | 39.5 MiB | 2023 Feb 08 00:27 |
Handling JWTs Understanding Common Pitfalls - Bruce MacDonald, InfraHQ.eng.srt | 46.0 KiB | 2023 Feb 05 16:02 |
Handling JWTs Understanding Common Pitfalls - Bruce MacDonald, InfraHQ.mp4 | 21.9 MiB | 2023 Feb 08 00:27 |
How Do You Trust Your Open Source Software - Naveen Srinivasan, Endor Labs & Brian Russell, Google.eng.srt | 44.1 KiB | 2023 Feb 05 15:40 |
How Do You Trust Your Open Source Software - Naveen Srinivasan, Endor Labs & Brian Russell, Google.mp4 | 27.2 MiB | 2023 Feb 08 00:27 |
How to Secure Your Supply Chain at Scale - Hemil Kadakia & Yonghe Zhao, Yahoo.eng.srt | 57.9 KiB | 2023 Feb 05 15:37 |
How to Secure Your Supply Chain at Scale - Hemil Kadakia & Yonghe Zhao, Yahoo.mp4 | 35.0 MiB | 2023 Feb 08 00:27 |
Identity Based Segmentation for a ZTA - Zack Butcher, Tetrate & Ramaswamy Chandramouli, NIST.eng.srt | 68.6 KiB | 2023 Feb 05 15:38 |
Identity Based Segmentation for a ZTA - Zack Butcher, Tetrate & Ramaswamy Chandramouli, NIST.mp4 | 44.3 MiB | 2023 Feb 08 00:27 |
Improving Secure Pod-to-Pod Communication Within Kubernetes Using Thomas Edward Hahn & Mark Hahn.eng.srt | 64.0 KiB | 2023 Feb 05 15:47 |
Improving Secure Pod-to-Pod Communication Within Kubernetes Using Thomas Edward Hahn & Mark Hahn.mp4 | 41.1 MiB | 2023 Feb 08 00:27 |
Journey to Cloud-Native, K8s and Trying to Secure It. - Graham E. Chukwumaobi, Independent.eng.srt | 59.1 KiB | 2023 Feb 05 16:06 |
Journey to Cloud-Native, K8s and Trying to Secure It. - Graham E. Chukwumaobi, Independent.mp4 | 30.9 MiB | 2023 Feb 08 00:27 |
Keyless - Code Signing Without Fulcio - Nathan Smith, Chainguard.eng.srt | 67.8 KiB | 2023 Feb 05 15:58 |
Keyless - Code Signing Without Fulcio - Nathan Smith, Chainguard.mp4 | 26.3 MiB | 2023 Feb 08 00:27 |
Keynote Back to the Future Next-Generation Cloud Native Security - Matt Jarvis, Snyk.eng.srt | 25.0 KiB | 2023 Feb 05 16:02 |
Keynote Back to the Future Next-Generation Cloud Native Security - Matt Jarvis, Snyk.mp4 | 20.1 MiB | 2023 Feb 08 00:27 |
Keynote Closing Remarks - Emily Fox, Apple - Liz Rice, Isovalent - & Brandon Lum, Google.eng.srt | 2.0 KiB | 2023 Feb 05 16:03 |
Keynote Closing Remarks - Emily Fox, Apple - Liz Rice, Isovalent - & Brandon Lum, Google.mp4 | 1.8 MiB | 2023 Feb 08 00:27 |
Keynote Closing Remarks - Emily Fox, Apple - Liz Rice, Isovalent - Brandon Lum, Google.eng.srt | 3.6 KiB | 2023 Feb 05 15:37 |
Keynote Closing Remarks - Emily Fox, Apple - Liz Rice, Isovalent - Brandon Lum, Google.mp4 | 3.0 MiB | 2023 Feb 08 00:27 |
Keynote Fighting The Next War - Future Threats to OSS and Software Supply Chain Brian Behlendorf.eng.srt | 37.6 KiB | 2023 Feb 05 15:37 |
Keynote Fighting The Next War - Future Threats to OSS and Software Supply Chain Brian Behlendorf.mp4 | 25.9 MiB | 2023 Feb 08 00:27 |
Keynote It Takes a Community to Raise a Conference From Security Day to CloudNativeSe Emily Fox.eng.srt | 21.9 KiB | 2023 Feb 05 16:07 |
Keynote It Takes a Community to Raise a Conference From Security Day to CloudNativeSe Emily Fox.mp4 | 15.0 MiB | 2023 Feb 08 00:27 |
Keynote Learn by Hacking How to Run a 2,500 Node Kubernetes CTF - Andrew Martin & Andrés Vega.eng.srt | 21.0 KiB | 2023 Feb 05 15:37 |
Keynote Learn by Hacking How to Run a 2,500 Node Kubernetes CTF - Andrew Martin & Andrés Vega.mp4 | 17.7 MiB | 2023 Feb 08 00:27 |
Keynote Opening Remarks - Liz Rice, Chief Open Source Officer, Isovalent.eng.srt | 818 B | 2023 Feb 05 16:07 |
Keynote Opening Remarks - Liz Rice, Chief Open Source Officer, Isovalent.mp4 | 1.1 MiB | 2023 Feb 08 00:27 |
Keynote Panic in San Francisco The Critical Vulnerability That Wasn't - Shane Lawrence, Shopify.eng.srt | 29.9 KiB | 2023 Feb 05 16:06 |
Keynote Panic in San Francisco The Critical Vulnerability That Wasn't - Shane Lawrence, Shopify.mp4 | 19.6 MiB | 2023 Feb 08 00:27 |
Keynote Picture this Solving Security Problems Visually with eBPF - Liz Rice, Isovalent.eng.srt | 18.3 KiB | 2023 Feb 05 15:37 |
Keynote Picture this Solving Security Problems Visually with eBPF - Liz Rice, Isovalent.mp4 | 16.7 MiB | 2023 Feb 08 00:27 |
Keynote The Next Steps in Software Supply Chain Security - Brandon Lum, Software Engineer, Google.eng.srt | 24.9 KiB | 2023 Feb 05 16:07 |
Keynote The Next Steps in Software Supply Chain Security - Brandon Lum, Software Engineer, Google.mp4 | 18.9 MiB | 2023 Feb 08 00:27 |
Keynote Welcome Opening Remarks - Priyanka Sharma, Executive Director, CNCF.eng.srt | 27.4 KiB | 2023 Feb 05 15:37 |
Keynote Welcome Opening Remarks - Priyanka Sharma, Executive Director, CNCF.mp4 | 23.4 MiB | 2023 Feb 08 00:27 |
Learning from Supply Chain Failures and Best Practices in Other Industries - Demian Ginther.eng.srt | 50.8 KiB | 2023 Feb 05 15:53 |
Learning from Supply Chain Failures and Best Practices in Other Industries - Demian Ginther.mp4 | 27.7 MiB | 2023 Feb 08 00:27 |
Let’s Talk Software Supply Chains with TAG Security - Michael Lieberman, Kusari.eng.srt | 44.1 KiB | 2023 Feb 05 15:43 |
Let’s Talk Software Supply Chains with TAG Security - Michael Lieberman, Kusari.mp4 | 29.2 MiB | 2023 Feb 08 00:27 |
Leveraging SBOMS to Automate Packaging, Transfer, and Reporting of D Ian Dunbar-Hall & Jerod Heck.eng.srt | 48.0 KiB | 2023 Feb 05 15:54 |
Leveraging SBOMS to Automate Packaging, Transfer, and Reporting of D Ian Dunbar-Hall & Jerod Heck.mp4 | 24.4 MiB | 2023 Feb 08 00:27 |
Lightning Talk A Secure Software Supply Chain for Open Policy Agency (OPA) Policies - Omri Gazitt.eng.srt | 8.3 KiB | 2023 Feb 05 15:44 |
Lightning Talk A Secure Software Supply Chain for Open Policy Agency (OPA) Policies - Omri Gazitt.mp4 | 5.1 MiB | 2023 Feb 08 00:27 |
Lightning Talk Cloud(Security)Events - A Lightweight Framework for Security React Evan Anderson.eng.srt | 11.4 KiB | 2023 Feb 05 15:45 |
Lightning Talk Cloud(Security)Events - A Lightweight Framework for Security React Evan Anderson.mp4 | 5.6 MiB | 2023 Feb 08 00:27 |
Lightning Talk My First Supply Chain Security Pull Request as a 13-Year-Old - Neil Naveen.eng.srt | 6.0 KiB | 2023 Feb 05 15:44 |
Lightning Talk My First Supply Chain Security Pull Request as a 13-Year-Old - Neil Naveen.mp4 | 3.1 MiB | 2023 Feb 08 00:27 |
Lightning Talk Securing Your Source Repositories - 5 Tips to Get Started - Billy Lynch, Chainguard.eng.srt | 9.5 KiB | 2023 Feb 05 15:45 |
Lightning Talk Securing Your Source Repositories - 5 Tips to Get Started - Billy Lynch, Chainguard.mp4 | 4.5 MiB | 2023 Feb 08 00:27 |
Lightning Talk Software Dark Matter is the Enemy of Software Transparency - Santiago Torres-Arias.eng.srt | 9.6 KiB | 2023 Feb 05 15:44 |
Lightning Talk Software Dark Matter is the Enemy of Software Transparency - Santiago Torres-Arias.mp4 | 4.5 MiB | 2023 Feb 08 00:27 |
Mapping Motives Tells a Story Analysis of 2,000 Enterprise Cloud Detec David Wolf & Joshua Smith.eng.srt | 69.7 KiB | 2023 Feb 05 15:56 |
Mapping Motives Tells a Story Analysis of 2,000 Enterprise Cloud Detec David Wolf & Joshua Smith.mp4 | 37.5 MiB | 2023 Feb 08 00:27 |
Modifying the Immutable Attaching Artifacts to OCI Images - Brandon Mitchell, BoxBoat.eng.srt | 88.6 KiB | 2023 Feb 05 15:57 |
Modifying the Immutable Attaching Artifacts to OCI Images - Brandon Mitchell, BoxBoat.mp4 | 34.9 MiB | 2023 Feb 08 00:27 |
More Than Just a Pretty Penny Why You Need Cybersecurity in Callan Andreacchi & Michaela Flatau.eng.srt | 51.2 KiB | 2023 Feb 05 15:37 |
More Than Just a Pretty Penny Why You Need Cybersecurity in Callan Andreacchi & Michaela Flatau.mp4 | 32.4 MiB | 2023 Feb 08 00:27 |
Network Security at Scale L3 Through L7 at Splunk - Mitch Connors & Bernard Van De Walle.eng.srt | 56.0 KiB | 2023 Feb 05 15:38 |
Network Security at Scale L3 Through L7 at Splunk - Mitch Connors & Bernard Van De Walle.mp4 | 33.5 MiB | 2023 Feb 08 00:27 |
Not All That’s Signed Is Secure Verify the Right Way with TUF and Zachary Newman & Marina Moore.eng.srt | 73.5 KiB | 2023 Feb 05 15:53 |
Not All That’s Signed Is Secure Verify the Right Way with TUF and Zachary Newman & Marina Moore.mp4 | 30.6 MiB | 2023 Feb 08 00:27 |
OmniBOR Bringing the Receipts for Supply Chain Security - Frederick Kautz, SPIFFE SPIRE.eng.srt | 61.3 KiB | 2023 Feb 05 15:41 |
OmniBOR Bringing the Receipts for Supply Chain Security - Frederick Kautz, SPIFFE SPIRE.mp4 | 28.1 MiB | 2023 Feb 08 00:27 |
On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE SPIRE.eng.srt | 85.1 KiB | 2023 Feb 05 15:38 |
On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE SPIRE.mp4 | 32.7 MiB | 2023 Feb 08 00:27 |
Package Transparency for WebAssembly Registries - Kyle Brown, SingleStore.eng.srt | 74.2 KiB | 2023 Feb 05 15:38 |
Package Transparency for WebAssembly Registries - Kyle Brown, SingleStore.mp4 | 31.7 MiB | 2023 Feb 08 00:27 |
SBOMs, VEX, and Kubernetes.eng.srt | 69.5 KiB | 2023 Feb 05 16:04 |
SBOMs, VEX, and Kubernetes.mp4 | 40.0 MiB | 2023 Feb 08 00:27 |
Securing Diverse Supply Chains Across Interconnected Systems - Wayne Starr & Aaron Creel.eng.srt | 44.9 KiB | 2023 Feb 05 15:44 |
Securing Diverse Supply Chains Across Interconnected Systems - Wayne Starr & Aaron Creel.mp4 | 22.6 MiB | 2023 Feb 08 00:27 |
Securing Self-Hosted GitHub Actions with Kubernetes & Actions-Runner-Controller - Natalie Somersall.eng.srt | 73.2 KiB | 2023 Feb 05 15:39 |
Securing Self-Hosted GitHub Actions with Kubernetes & Actions-Runner-Controller - Natalie Somersall.mp4 | 40.2 MiB | 2023 Feb 08 00:28 |
Securing User to Service Access in Kubernetes - Maya Kaczorowski & Maisem Ali, Tailscale.eng.srt | 75.9 KiB | 2023 Feb 05 15:47 |
Securing User to Service Access in Kubernetes - Maya Kaczorowski & Maisem Ali, Tailscale.mp4 | 40.7 MiB | 2023 Feb 08 00:28 |
Securing the Superpowers Who Loaded That EBPF Program - John Fastabend & Natalia Reka Ivanko.eng.srt | 65.9 KiB | 2023 Feb 05 15:56 |
Securing the Superpowers Who Loaded That EBPF Program - John Fastabend & Natalia Reka Ivanko.mp4 | 36.9 MiB | 2023 Feb 08 00:28 |
Security Does Not Need to Be Fun Ignoring OWASP to Have a Terrible Time - Dwayne McDaniel.eng.srt | 51.1 KiB | 2023 Feb 05 15:47 |
Security Does Not Need to Be Fun Ignoring OWASP to Have a Terrible Time - Dwayne McDaniel.mp4 | 27.1 MiB | 2023 Feb 08 00:28 |
Security Hide Your Secrets via a Distributed Hardware Security Mod Iris Ding & Malini Bhandaru.eng.srt | 40.0 KiB | 2023 Feb 05 15:55 |
Security Hide Your Secrets via a Distributed Hardware Security Mod Iris Ding & Malini Bhandaru.mp4 | 25.5 MiB | 2023 Feb 08 00:28 |
Security That Enables Breaking Down Security Silos in the DevOps Ecosystem - Saurabh Wadhwa, Uptycs.eng.srt | 34.4 KiB | 2023 Feb 05 15:58 |
Security That Enables Breaking Down Security Silos in the DevOps Ecosystem - Saurabh Wadhwa, Uptycs.mp4 | 20.3 MiB | 2023 Feb 08 00:28 |
Security Threat Modeling Live from Scratch Session - Andrew Martin, Control Plane.eng.srt | 71.9 KiB | 2023 Feb 05 15:54 |
Security Threat Modeling Live from Scratch Session - Andrew Martin, Control Plane.mp4 | 45.8 MiB | 2023 Feb 08 00:28 |
Security as Code A DevSecOps Approach - Xavier René-Corail, GitHub.eng.srt | 55.5 KiB | 2023 Feb 05 15:46 |
Security as Code A DevSecOps Approach - Xavier René-Corail, GitHub.mp4 | 38.1 MiB | 2023 Feb 08 00:28 |
Self Healing GitOps Continuous, Secure GitOps Using Argo CD, Helm and OPA - Upkar Lidder , Tenable.eng.srt | 56.4 KiB | 2023 Feb 05 16:07 |
Self Healing GitOps Continuous, Secure GitOps Using Argo CD, Helm and OPA - Upkar Lidder , Tenable.mp4 | 33.5 MiB | 2023 Feb 08 00:28 |
Sharing Security Secrets How to Encourage Security Advocates - Cailyn Edwards, Shopify.eng.srt | 60.7 KiB | 2023 Feb 05 15:52 |
Sharing Security Secrets How to Encourage Security Advocates - Cailyn Edwards, Shopify.mp4 | 31.8 MiB | 2023 Feb 08 00:28 |
So You Want to Run Your Own Sigstore Recommendations for a Secure Setup - Hayden Blauzvern, Google.eng.srt | 62.0 KiB | 2023 Feb 05 15:39 |
So You Want to Run Your Own Sigstore Recommendations for a Secure Setup - Hayden Blauzvern, Google.mp4 | 28.2 MiB | 2023 Feb 08 00:28 |
Solving Multi-Service Without a Service Mesh - Evan Anderson, VMware.eng.srt | 60.1 KiB | 2023 Feb 05 16:01 |
Solving Multi-Service Without a Service Mesh - Evan Anderson, VMware.mp4 | 33.1 MiB | 2023 Feb 08 00:28 |
Spicing up Container Image Security with SLSA & GUAC - Ian Lewis, Google.eng.srt | 64.6 KiB | 2023 Feb 05 15:52 |
Spicing up Container Image Security with SLSA & GUAC - Ian Lewis, Google.mp4 | 35.8 MiB | 2023 Feb 08 00:28 |
Sponsored Keynote Cloud Security’s Hidden Force Threat Detection - Loris Degioanni, Sysdig.eng.srt | 8.2 KiB | 2023 Feb 05 15:37 |
Sponsored Keynote Cloud Security’s Hidden Force Threat Detection - Loris Degioanni, Sysdig.mp4 | 7.0 MiB | 2023 Feb 08 00:28 |
Sponsored Keynote From Google to NIST - The Future of Cloud Native Security - Zack Butcher, Tetrate.eng.srt | 9.1 KiB | 2023 Feb 05 15:37 |
Sponsored Keynote From Google to NIST - The Future of Cloud Native Security - Zack Butcher, Tetrate.mp4 | 6.8 MiB | 2023 Feb 08 00:28 |
Sponsored Keynote Kubernetes is the Perfect Platform for Enforcing Zero Trust Security - Fei Huang.eng.srt | 9.3 KiB | 2023 Feb 05 16:03 |
Sponsored Keynote Kubernetes is the Perfect Platform for Enforcing Zero Trust Security - Fei Huang.mp4 | 8.0 MiB | 2023 Feb 08 00:28 |
Sponsored Keynote OpenClarity A Community-Led Approach to Cloud-Native Applicat Sarabjeet Chugh.eng.srt | 9.2 KiB | 2023 Feb 05 16:05 |
Sponsored Keynote OpenClarity A Community-Led Approach to Cloud-Native Applicat Sarabjeet Chugh.mp4 | 8.6 MiB | 2023 Feb 08 00:28 |
Sponsored Keynote Trust and Risk in the Software Supply Chain - Emmy Eide, Red Hat.eng.srt | 13.0 KiB | 2023 Feb 05 16:06 |
Sponsored Keynote Trust and Risk in the Software Supply Chain - Emmy Eide, Red Hat.mp4 | 7.0 MiB | 2023 Feb 08 00:28 |
Sponsored Keynote Why Developer Laptop Security is Key to Securing Your CI CD Pip Saurabh Wadhwa.eng.srt | 9.9 KiB | 2023 Feb 05 15:37 |
Sponsored Keynote Why Developer Laptop Security is Key to Securing Your CI CD Pip Saurabh Wadhwa.mp4 | 8.0 MiB | 2023 Feb 08 00:28 |
Standardization & Security - A Perfect Match - Ravi Devineni & Vinny Carpenter, Northwestern Mutual.eng.srt | 72.6 KiB | 2023 Feb 05 15:37 |
Standardization & Security - A Perfect Match - Ravi Devineni & Vinny Carpenter, Northwestern Mutual.mp4 | 34.6 MiB | 2023 Feb 08 00:28 |
TAG Security Cloud Native Security Whitepapers Overview - Shlomo Zalman Heigh, CyberArk.eng.srt | 36.3 KiB | 2023 Feb 05 15:59 |
TAG Security Cloud Native Security Whitepapers Overview - Shlomo Zalman Heigh, CyberArk.mp4 | 19.6 MiB | 2023 Feb 08 00:28 |
Taming Attestation for the Cloud Native World with Parsec - Paul Howard, Arm.eng.srt | 55.1 KiB | 2023 Feb 05 15:55 |
Taming Attestation for the Cloud Native World with Parsec - Paul Howard, Arm.mp4 | 28.3 MiB | 2023 Feb 08 00:28 |
Tutorial Hands-on Hacking Kubernetes and Ways to Prevent It - Eric Smalling, Snyk.eng.srt | 137.3 KiB | 2023 Feb 05 16:00 |
Tutorial Hands-on Hacking Kubernetes and Ways to Prevent It - Eric Smalling, Snyk.mp4 | 88.6 MiB | 2023 Feb 08 00:28 |
Tutorial How to Build a K8s Admission Controller fro Stephen Giguere, Angela Gizzi, Matt Johnson.mp4 | 96.0 MiB | 2023 Feb 08 00:28 |
Unpacking Open Source Security in Public Repos & Registries - Ben Hirschberg, ARMO.eng.srt | 56.2 KiB | 2023 Feb 05 15:40 |
Unpacking Open Source Security in Public Repos & Registries - Ben Hirschberg, ARMO.mp4 | 31.8 MiB | 2023 Feb 08 00:28 |
Verifiable GitHub Actions with eBPF - Jose Donizetti & Itay Shakury, Aqua Security.eng.srt | 65.0 KiB | 2023 Feb 05 15:43 |
Verifiable GitHub Actions with eBPF - Jose Donizetti & Itay Shakury, Aqua Security.mp4 | 35.6 MiB | 2023 Feb 08 00:28 |
What's a Zero-Trust Tunnel Exploring Security and Simpler Operations w Jim Barton & Marino Wijay.eng.srt | 68.4 KiB | 2023 Feb 05 15:38 |
What's a Zero-Trust Tunnel Exploring Security and Simpler Operations w Jim Barton & Marino Wijay.mp4 | 43.0 MiB | 2023 Feb 08 00:28 |
When SysAdmins Quit Protecting Kubernetes Clusters When the Owner of Multiple Arun Krishnakumar.eng.srt | 48.7 KiB | 2023 Feb 05 15:57 |
When SysAdmins Quit Protecting Kubernetes Clusters When the Owner of Multiple Arun Krishnakumar.mp4 | 29.2 MiB | 2023 Feb 08 00:28 |
Who Are You I Really Want to Know the Magic Behind OIDC - Eddie Zaneski, Chainguard.eng.srt | 62.0 KiB | 2023 Feb 05 15:47 |
Who Are You I Really Want to Know the Magic Behind OIDC - Eddie Zaneski, Chainguard.mp4 | 44.5 MiB | 2023 Feb 08 00:28 |
Yes, Application Security Leads to Better Business Value. Learn How from Experts..eng.srt | 89.4 KiB | 2023 Feb 05 15:38 |
Yes, Application Security Leads to Better Business Value. Learn How from Experts.mp4 | 70.1 MiB | 2023 Feb 08 00:28 |
Zero Trust Workload Identity in Kubernetes - Michael Peters, Red Hat.eng.srt | 74.7 KiB | 2023 Feb 05 15:47 |
Zero Trust Workload Identity in Kubernetes - Michael Peters, Red Hat.mp4 | 34.9 MiB | 2023 Feb 08 00:28 |
Zero Trust in the Cloud with WebAssembly and WasmCloud - Kevin Hoffman, Cosmonic.eng.srt | 43.0 KiB | 2023 Feb 05 16:02 |
Zero Trust in the Cloud with WebAssembly and WasmCloud - Kevin Hoffman, Cosmonic.mp4 | 32.5 MiB | 2023 Feb 08 00:28 |