KubeCon 2023: Securing Software Delivery and Deployment

Gopal Dommety: So Mitch, we started OpsMX with the vision to fully automate and secure software delivery.
Gopal Dommety: And so we provide a deployment firewall.
They tend to have large deployments, Fortune 10 kind of customers, that's what OpsMx.
Gopal Dommety: Deployment into, yeah, both cloud and private data centers.
That's really what we're focused on showing here today at KubeCon is this idea of how do we start to get really an end-to-end view of that application lifecycle from when the developer starts the code, when that code lines into production.
We're showing at our booth, Gopal mentioned the deployment firewall.
That's a new capability we just announced a couple of weeks ago that's designed to do automated compliance and policy enforcement as part of a software delivery process.
It's a last comprehensive gate that makes sure the code, the process, the people, the delivery and the deployment, all five of them have happened and we have tested.
Gopal Dommety: Yes, so you're right, there are lots of deployment targets.
We built in sort of the deployment firewall actually has come into being actually working with our customer that scale.
We might think of it as a byproduct, but I actually think some of the essential things is all the data we create in that process is what we can use for our audits and for compliance, whether it be security or our own internal processes so you're not writing documentation at the end, I've got the data I can present.
During the deployment we use AI ML to understand the behavioral characteristics of an application and understand if there are any security risks that are being sort of generated during the deployment.
David Greene: Well, there's also the piece, I think you're talking a little bit Gopal about the deployment process itself, the process of deploying machine learning models, it's fundamentally a deployment process.
Even though there's now data with the code, it's still fundamentally a delivery and deployment process production.
We didn't realize half the pipelines were machine learning models, and so we apply the security layer to that deployment.
It's a good point about we don't typically deliver a lot of data in our deployment pipelines.
That's a new dimension of delivery that has in the last two years has really taken off.
You said securing, automating software delivery, that's the new dimension, the models and the data associated with the models.
Once we have that delivery bill of materials in this application graph, you can do lots of interesting things, including some generative AI way to understand how things happen.
For people who want to try out this solution, we've got demo environments, trial environments they can do to kind of see for themselves how this sort of compliance and sandbox might work for themselves at deployment firewall.


This Cyber News was published on securityboulevard.com. Publication date: Tue, 19 Dec 2023 01:13:04 +0000


Cyber News related to KubeCon 2023: Securing Software Delivery and Deployment

KubeCon 2023: Securing Software Delivery and Deployment - Gopal Dommety: So Mitch, we started OpsMX with the vision to fully automate and secure software delivery. Gopal Dommety: And so we provide a deployment firewall. They tend to have large deployments, Fortune 10 kind of customers, that's what OpsMx. ...
6 months ago Securityboulevard.com
DevSecOps: Definition, Benefits and Best Practices - DevSecOps is an approach that focuses on the alignment of the three core pillars of DevOps — Development, Operations, and Security. It’s a combination of processes, tools and practices designed to enable organizations to adopt innovative and ...
1 year ago Heimdalsecurity.com
Securing Student Data in Cloud Services - In today's educational landscape, securing student data in cloud services is of utmost importance. One key aspect of securing student data in cloud services is ensuring proper data encryption. This article explores the various challenges and best ...
6 months ago Securityzap.com
What Is Software Piracy? - Software piracy has become a worldwide issue, with China, the United States and India being the top three offenders. In 2022, 6.2% of people worldwide visited software piracy websites. Software piracy doesn't require a hacker or skilled coder. Any ...
7 months ago Pandasecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
7 months ago Esecurityplanet.com
Three Trends to Watch in 2024 - Our new guide, The Healthcare CISO's Guide to Cybersecurity Transformation, highlights the latest trends in healthcare today and where security leaders should focus their defensive efforts going forward. Malicious attacks on healthcare have grown ...
5 months ago Paloaltonetworks.com
The Crucial Need for a Secure Software Development Lifecycle in Today's Digital Landscape - In today's increasingly digital world, software is the backbone of business operations, from customer-facing applications to internal processes. The rapid growth of software development has also made organizations more vulnerable to security threats. ...
5 months ago Cyberdefensemagazine.com
New "MITRE ATT&CK-like" framework outlines software supply chain attack TTPs - A new open framework seeks to outline a comprehensive and actionable way for businesses and security teams to understand attacker behaviors and techniques specifically impacting the software supply chain. The Open Software Supply Chain Attack ...
1 year ago Csoonline.com
The Role of DevOps in Enhancing the Software Development Life Cycle - Software development is a complex and dynamic field requiring constant input, iteration, and collaboration. DevOps is more than just a methodology; it combines practices seamlessly integrating software development and IT operations for streamlining ...
5 months ago Feeds.dzone.com
Flask Web App: Smart Honeypot Deployment With RL - The goal of a honeypot is to deceive attackers into interacting with them, enabling security experts to observe and analyze their behavior. By applying RL, we can develop a smart honeypot deployment system that learns and adapts to emerging threats ...
4 days ago Feeds.dzone.com
How Patch Management Software Solves the Update Problem - I've never met an IT leader who doesn't know how important patch management is. At Heimdal, we believe patch management software provides the solution to this problem. Patch management software is a technology that allows businesses to automate the ...
5 days ago Heimdalsecurity.com
12 Software Dev Predictions for Future - Predicting the future of software development trends is always a tough call. Such trends will also rule the future of the software development industry. Analyzing these future software development trends will put enthusiasts ahead of the competition. ...
5 months ago Feeds.dzone.com
10 Major Benefits of Cloud-Native Application Development - Cloud-native application development combines organizational and technical changes in the design, build, and deployment of software in the cloud to deliver value faster and improve overall business efficiency. UST experts reimagine cloud strategy, ...
4 months ago Esecurityplanet.com
A Look at Container Security Through the Lens of DevOps - According to Forrester, 71% of DevOps teams leverage containers and microservices to deliver applications. These facts warrant a closer look at container security, with a focus on how DevOps can provide a robust framework for the entire software ...
6 days ago Tripwire.com
Understanding SBOMs - In recent years, the adoption of open-source software in development has surged, now comprising up to 90% of what's built. There is a crucial aspect to consider when integrating open-source software components. To make sure their software is safe, ...
6 months ago Securityboulevard.com
Software Supply Chain Security Checklist - In the ever-evolving landscape of digital innovation, the integrity of software supply chains has become a pivotal cornerstone for organizational security. Software supply chain security is not just about protecting code - it's about safeguarding the ...
5 months ago Feeds.dzone.com
Zarf: Open-source continuous software delivery on disconnected networks - Zarf is a free, open-source tool that enables continuous software delivery on disconnected networks. It currently offers fully automated support for K3s, K3d, and Kind and is also compatible with EKS, AKS, GKE, RKE2, and many other distro services. ...
2 months ago Helpnetsecurity.com
Most developers have adopted devops, survey says - As of the first quarter of 2024, 83% of developers were involved in devops-related activities such as performance monitoring, security testing, or CI/CD, according to the State of CI/CD Report 2024, published by the Continuous Delivery Foundation, a ...
2 months ago Infoworld.com
Essential Features of Cybersecurity Management Software for MSPs - Protect your clients' businesses from cyber threats with Cybersecurity Management Software. A vital tool that aids MSPs in enhancing their cybersecurity practices is Cybersecurity Management Software. In this article, we will delve into the features ...
1 month ago Hackread.com
10 reasons why securing software supply chains needs to start with containers - Containers and Kubernetes are table stakes for multi-cloud app development, and they're also among the least protected of any areas of software supply chains. Kubernetes commands 92% of the container orchestration platform market, despite DevOps ...
5 months ago Venturebeat.com
Rootkit Turns Kubernetes from Orchestration to Subversion - As software development focuses on continuous integration and deployment, orchestration platforms like Kubernetes have taken off, but that popularity has put them in attackers' crosshairs. Most successful attacks - at least those publicly reported - ...
7 months ago Darkreading.com
Consumer Software Security Assessment: Should We Follow NHTSA's Lead? - The US National Highway Traffic Safety Administration is dedicated to its mission: "To save lives, prevent injuries, and reduce economic costs due to road traffic crashes, through education, research, safety standards, and enforcement." Is it time to ...
7 months ago Darkreading.com
AI software market to hit $307 billion by 2027 - The worldwide revenue for AI software will reach $307 billion in 2027, according to IDC. The forecast for AI-centric software includes Artificial Intelligence Platforms, AI Applications, AI System Infrastructure Software, and AI Application ...
6 months ago Helpnetsecurity.com
Accelerating Cloud-Native Data Security Deployments at Scale with Imperva's eDSF Kit - Elastic DSF is the vision of DSF. The first phase of this vision is creating automatic, click of a button processes to deploy and upgrade DSF with the introduction of Imperva eDSF Kit. eDSF Kit simplifies the product deployment, upgrades, and ongoing ...
7 months ago Imperva.com
Beware of Expired or Compromised Code Signing Certificates - One of the vital security measures taken in this direction is the use of code signing certificates to prove software authenticity, integrity and security. Code signing certificates, used for digitally signing applications and software, are an ...
7 months ago Securityboulevard.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)