Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Back to webinars
点播网络研讨会

从源头上阻止违反策略

Fixing security misconfigurations in the IaC you use to provision cloud services

点播

喝杯咖啡或您最喜欢的饮料,和我们一起进行两周一次的技术讨论,探索如何使用 Tenable Cloud Security 有效解决一系列云安全挑战。

Calling all vulnerability and threat management pros, cloud architects and engineers, DevSecOps and cloud operations leaders seeking guidance and insights for gaining control over key cloud security challenges – especially in the context of an overall exposure management program. This session has your back.

In this on-demand session John and Robert explore ways you can stop policy violations at the source by easily scanning IaC and Git repositories with Tenable Cloud Security.


演讲嘉宾

Photo of John Tonello, Cloud Security Advocate, Tenable
John Tonello

Cloud Security Advocate, Tenable

Robert Maury, Senior Security Engineer, Tenable
Robert Maury

高级安全工程师 Tenable

Register for Webinar

Watch On-Demand Now.
× 联系我们的销售团队