準確傳達網路風險,才能讓利害關係人採取可促進業務價值的行動 Facebook Google Plus Twitter LinkedIn YouTube RSS 功能表 搜尋 資源 - 部落格資源 - 網路研討會資源 - 報告資源 - 活動icons_066 icons_067icons_068icons_069icons_070
Back to webinars
隨選網路研討會

從源頭遏止原則違規

Fixing security misconfigurations in the IaC you use to provision cloud services

隨需觀看

帶上一杯咖啡或您喜歡的飲料,加入我們每兩週一次的技術討論,探討您可以利用 Tenable Cloud Security 有效解決各種雲端安全問題的方法。

Calling all vulnerability and threat management pros, cloud architects and engineers, DevSecOps and cloud operations leaders seeking guidance and insights for gaining control over key cloud security challenges – especially in the context of an overall exposure management program. This session has your back.

In this on-demand session John and Robert explore ways you can stop policy violations at the source by easily scanning IaC and Git repositories with Tenable Cloud Security.


主講人:

Photo of John Tonello, Cloud Security Advocate, Tenable
John Tonello

Cloud Security Advocate, Tenable

Robert Maury, Senior Security Engineer, Tenable
Robert Maury

Tenable 資深安全工程師

Register for Webinar

Watch On-Demand Now.
× Contact our sales team