filmov
tv
Securing Your Containerized Applications with NGINX
![preview_player](https://i.ytimg.com/vi/spVQex_qj_s/maxresdefault.jpg)
Показать описание
--
NGINX is one of the most popular images on Docker Hub and has been at the forefront of the web since the early 2000's. In this talk we will discuss how and why NGINX's lightweight and powerful architecture makes it a very popular choice for securing containerized applications as a sidecar reverse proxy within containers. We will highlight important aspects of application security that NGINX can help with, such as TLS, HTTP, AuthN, AuthZ and traffic control.
Speaker: Kevin Jones, NGINX
Twitter: @webopsx
NGINX is one of the most popular images on Docker Hub and has been at the forefront of the web since the early 2000's. In this talk we will discuss how and why NGINX's lightweight and powerful architecture makes it a very popular choice for securing containerized applications as a sidecar reverse proxy within containers. We will highlight important aspects of application security that NGINX can help with, such as TLS, HTTP, AuthN, AuthZ and traffic control.
Speaker: Kevin Jones, NGINX
Twitter: @webopsx
Securing Your Containerized Applications with NGINX
Container Security Explained
Best Practices For Securing Your Containerized Applications
Building a Secure Docker Application
Managing Secrets in a Container Environment
How to Secure Containerized Applications
Containerized Application Cyber Security #cybersecurity #microservices #containerization
Best Practices for Securing Containerized Applications
Unlocking the Hidden Power of Serverless for your GenAI Apps
AWS re:Inforce 2023 - A deep dive into container security on AWS (APS204-S)
AWS re:Invent 2020: Securing your Amazon ECS applications: Best practices
Designing Secure Containerized Applications for Embedded Linux Devices
A Faster, More Secure Path to Deploy & Manage Your Containerized Apps
Containerized Application - Security Recommendations
Kubernetes Runtime Security: What Happens if a Container Goes Bad?
Container Security Best Practices | Docker Security Best Practices | Docker Security Vulnerabilities
AWS re:Invent 2016: Securing Container-Based Applications (CON402)
How to protect Linux from Hackers // My server security strategy!
AWS re:Invent 2020: Securing your Amazon EKS applications: Best practices
Virtual Machines vs Containers
The Power of Application Intent Analysis for Container Security [I] - John Morello, Twistlock
Securing Container Images with Harbor, an Open Source Registry (Americas Webinar)
The Container Security Checklist
Container Security • Liz Rice & Eoin Woods • GOTO 2020
Комментарии