12 subscribers
Go offline with the Player FM app!
7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts
Manage episode 308738046 series 3018913
If organizations take more steps to address security-related activities now, they will be less likely to encounter security incidents in the future. When it comes to application containers, security is achieved through adopting a series of best practices and guidelines. In this SEI Podcast, Tom Scanlon and Richard Laughlin, researchers with the SEI's CERT Division, discuss seven steps that developers can take to engineer security into ongoing and future container adoption efforts.
409 episodes
Manage episode 308738046 series 3018913
If organizations take more steps to address security-related activities now, they will be less likely to encounter security incidents in the future. When it comes to application containers, security is achieved through adopting a series of best practices and guidelines. In this SEI Podcast, Tom Scanlon and Richard Laughlin, researchers with the SEI's CERT Division, discuss seven steps that developers can take to engineer security into ongoing and future container adoption efforts.
409 episodes
All episodes
×
1 The Best and Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition 21:40

1 Updating Risk Assessment in the CERT Secure Coding Standard 26:04

1 Delivering Next Generation Cyber Capabilities to the DoD Warfighter 27:16

1 Getting the Most Out of Your Insider Risk Data with IIDES 39:14

1 Grace Lewis Outlines Vision for IEEE Computer Society Presidency 18:14

1 Improving Machine Learning Test and Evaluation with MLTE 29:06

1 DOD Software Modernization: SEI Impact and Innovation 27:12

1 Securing Docker Containers: Techniques, Challenges, and Tools 39:09

1 An Introduction to Software Cost Estimation 22:55

1 Cybersecurity Metrics: Protecting Data and Understanding Threats 27:00

1 3 Key Elements for Designing Secure Systems 36:28

1 Using Role-Playing Scenarios to Identify Bias in LLMs 45:07

1 Best Practices and Lessons Learned in Standing Up an AISIRT 38:29

1 3 API Security Risks (and How to Protect Against Them) 19:28

1 Evaluating Large Language Models for Cybersecurity Tasks: Challenges and Best Practices 43:05
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.