Episode 4: Stop Policy Violations at the Source
Fixing security misconfigurations in the IaC you use to provision cloud services
- Container Security
- Tenable Cloud Security
Grab a coffee or your favorite beverage and join us for a bi-weekly, technical discussion exploring ways you can effectively address a range of cloud security challenges using Tenable Cloud Security.
Calling all vulnerability and threat management pros, cloud architects and engineers, DevSecOps and cloud operations leaders seeking guidance and insights for gaining control over key cloud security challenges – especially in the context of an overall exposure management program. This session has your back.
In this on-demand session John and Robert explore ways you can stop policy violations at the source by easily scanning IaC and Git repositories with Tenable Cloud Security.
Cloud Security Advocate, Tenable
Senior Security Engineer, Tenable