-
Cloud Security in the Age of AI: Insights from Dot Security's CTO
Explore the future of cloud security and AI with Jeff Leder, CTO of Dot Security. Discover key cybersecurity challenges, the shift-left approach, and how AI is reshaping the threat landscape.
-
What is Sustainable Data Management and How Can Companies Reduce Their Carbon Footprints
Understand sustainable data management and its effects on reducing carbon footprints for digitally-driven businesses.
-
Sweet Demo: Intelligent Vulnerability Prioritization Using AI and Runtime Insights
Discover how Sweet Security cuts through vulnerability noise with runtime insights and AI-driven analysis, so you can prioritize real risks, reduce alert fatigue, and protect what truly matters.
-
Breaking the Cloud Security Illusion: Putting the App Back in CNAPP
Legacy CNAPPs lack application visibility, leaving blind spots to API abuse, data exposure, and complex attacks. True cloud security requires deep insight into application behavior and runtime activity.
-
Mitigant's cloud attack emulation: Real security testing without breaking production
Mitigant's Nils Karn and Thomas Fricke explore cloud attack emulation—real attacks in safe environments—to test resilience and improve security with high accuracy.
-
How Atlas Makes Database Schema Management More Declarative and Compliant
Understand how organizations struggling with traditional database schema management greatly benefit from Atlas’s offerings.
-
Aviatrix and the surprising upside of better cloud firewalls
Scott Leatherman of Aviatrix discusses securing cloud-native environments, modern Kubernetes firewalls, reducing IP exhaustion, and how better security enables application modernization.
-
Calico v3.30 brings observability, staged policies and more to improve Kubernetes network security
Discover Calico v3.30 with Tigera’s Reza Ramezanpour—enhanced observability, staged policy testing, Gateway API integration, and advanced Kubernetes networking security insights.
-
ActiveState’s SBOM-first approach: Revolutionizing open-source dependency management
Discover how ActiveState’s SBOM-first approach revolutionizes open-source dependency management. Enhance security and streamline compliance.
-
9 Challenges of authentication in cloud-native and Kubernetes environments that Zitadel helps avoid
Discover authentication challenges in cloud-native and Kubernetes environments and how Zitadel helps overcome them with scalable, secure, and modern identity solutions.
-
Automating Cloud Network Infrastructure with Kubernetes CNI Plugins
How to manage cloud network infrastructures with Kubernetes CNI plugins
-
Securing the Future: Sysdig on AI Threats, Falco, and Real-Time Cloud Defense
Sergej Epp discusses AI-driven cloud threats, Falco’s evolution, and Sysdig’s latest innovations—offering insights and advice on real-time detection and response at KubeCon.