Главная
Study mode:
on
1
Introduction
2
Is cloud workloads evolve
3
Four characteristics of workloads
4
Web application security
5
Web attacks
6
Runtime risks
7
Predictive model
8
Application security Continuum
9
Web Application Exploits
10
Web Application Security Solution
11
Cloud Native Application Security
12
Benefits of Cloud Native Application Security
13
Demo
14
Cloud onboarding
15
Cloud accounts
16
repositories
17
vulnerabilities
18
rule creation
19
model creation
20
workload protection
21
add protection
22
container protection
23
summary
24
call to action
Description:
Learn how to achieve comprehensive protection for your applications and workloads in this 59-minute CNCF conference talk. Explore the evolution of cloud workloads, understand the four key characteristics of workloads, and delve into web application security, including common web attacks and runtime risks. Discover the application security continuum and examine web application exploits and their solutions. Gain insights into cloud native application security and its benefits. Watch a detailed demo covering cloud onboarding, account management, repository handling, vulnerability assessment, rule creation, model development, and workload protection. Conclude with a summary and actionable steps to enhance your application security in cloud environments.

How to Achieve Comprehensive Protection for Cloud Native Applications and Workloads

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00