Deploying Microservices In Hybrid And Heterogeneous Environments On AWS With Istio Service Mesh
Deploying microservices is complex to begin with, but things become even more challenging when deploying in hybrid and heterogeneous environments. In this presentation, we will discuss the benefits and challenges of deploying ...
How to Run Serverless Containers in AWS EKS With Fargate and Knative
Recently, a customer reached out with an interesting request. They wanted us to run containers in serverless mode with AWS EKS. Their intention was to use Kubernetes features and run containers in ...
Live-Hacking Container Workloads on AWS
In this live hacking session, we’ll exploit an application as an attacker would to showcase some of the most common container vulnerabilities and how they expose your containerized application to a malicious ...
AWS Open Source Finch Tool Streamlines Container App Development
The open source Finch project from Amazon Web Services (AWS) provides developers with a command line client for building, running and publishing Linux containers. Initially available on macOS clients, Finch provides developers ...
AWS Leverages Containers to Automate ML Model Deployments
Amazon Web Services (AWS) is leveraging containers to make it simpler to deploy machine learning models constructed using the Amazon SageMaker Studio Notebook tool in production environments. Rather than setting up, configuring ...
AWS Strengthens Container Security in the Cloud
Amazon Web Services (AWS) has extended the reach of the Amazon GuardDuty security monitoring service to include threat detection for the runtime environments in which containers are deployed. In addition, AWS Nitro ...
AWS Tightens EKS and AWS Marketplace Integration
Amazon Web Services (AWS) this week made available an extension of the Amazon Elastic Kubernetes Service (EKS) service that makes it simpler to add software downloaded from the AWS Marketplace for Containers ...
Securely Delegating Access to Your AWS Resources
Having trouble securely delegating access to your AWS resources? There are tools that can help ensure granular control over who can access your AWS resources without slowing your teams down. On December ...
5 Laws of Cloud-Native Authorization
In a microservices world, each service needs to verify that a subject (user or machine) has permission to perform an operation on a resource that the service manages. But in an agile ...
Threat Detection and Response for AWS Fargate
In this session, Sysdig and AWS will discuss how to tackle the unique challenges of securing serverless environments. You’ll learn how the right tooling can help you meet your cloud security goals, ...