Terms
Privacy
/
© 2022 Wind River Systems, Inc.
FORBES ARTICLE: Eight in Ten Leaders Want Intelligent Systems Success in Five Years But the Time to Start Blueprinting Is Now
FORBES ARTICLE: Eight in Ten Leaders Want Intelligent Systems Success in Five Years But the Time to Start Blueprinting Is Now
WEBINAR: The Modern RTOS: Deploying Applications Faster with Containers
WEBINAR: The Modern RTOS: Deploying Applications Faster with Containers
PODCAST: Exploring Security at the Intelligent Edge: Edge to Cloud & Container Security
PODCAST: Exploring Security at the Intelligent Edge: Edge to Cloud & Container Security
Want to learn more?
Explore related resources.
A lifecycle security implementation approach for a containerized environment
How to select and integrate security controls and compliance tools to mitigate container vulnerabilities
Top considerations for container and Kubernetes technologies in cloud-to-edge architectures
What you will learn:
Use of containers and Kubernetes has skyrocketed over the last few years. At the same time, the necessity for cloud-native technologies to secure data, applications, and infrastructure is accepted fact. Yet 94% of respondents in a recent Kubernetes study cited at least one security incident in their Kubernetes environments in the last 12 months.
Taking a defense-in-depth approach is fundamental to securing a containerized environment, whether in the cloud or at the edge.
By submitting this form you agree that your personal information will be used by Wind River to process this request and send you further information about Wind River products and services pursuant to our privacy notice located here: windriver.com/company/terms/privacy.
Register to watch
WIND RIVER On-Demand
Web Seminar
Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success.
Container Security from Cloud to Edge
Talk to a Wind River Expert /
Talk to a Wind River Expert /
Read the Latest in Robotics /
Read the Latest in Robotics /
Thank you for registering.
You will receive an email confirmation shortly.
Firefox Users:
If you are not seeing the registration form, change your Firefox privacy settings from "Strict" to "Standard" in the Privacy & Security section of the preferences menu
OR
Switch to another browser.
Scott McGregor
Cloud Security, Wind River
+ Read Bio
Speaker:
With 15 years of software experience and eight years of securing cloud-native technologies, certification as a cloud security and secure software lifecycle professional, and an educational background in computer science and software engineering, Scott McGregor has a proven track record of assisting industry-leading customers in their security transformations.
®
®
BIO
Scott McGregor
Cloud Security,
Wind River
Thank you for registering.
The video will begin playing shortly.
Click here if the video disappears