Cutting Edge Application- and API-Secruity

In Kubernetes

itsa 2023 set new records for visitor numbers and we were also pleased with the lively interest. We had exciting discussions at our exhibition stand about the change in application security and our live hacking sessions of applications in the container environment were very popular. 

At our congress, our guests were able to experience how the world of application security and access control has changed due to new technologies and approaches for greater agility and user-friendliness. Thomas Kohl led through the exciting programme with a short introduction:

 

itsa congress:

IT-Security - from a spoilsport to an accelerator of digitization.

Agenda of the Congress

The congress was held in german language.

See the presentationOpening by Thomas Kohl Senior Business Development International
See the presentationSimon Hülsbömer, Senior Project Manager Research Study Projects in the market research of CIO, CSO and COMPUTERWOCHE gave exciting insights into how German companies have already reacted to the changes, what status they are at with IAM as a service and what next steps are planned.
See the presentationEsther Schultz Product Manager for protect4use at our partner secunet presented how authentication works so seamlessly and universally that it goes almost unnoticed, while ensuring the highest standards of security and data protection. 

Presentation from Florian Hansemann

 

Presentation from Marc Buetikofer

Docker exposed: How hackers are attacking Kubernetes today and tomorrow
In this short keynote presentation by Florian Hansemann, the current attack techniques on Docker infrastructures were presented and corresponding countermeasures were shown.

Marc Bütikofer showed what can be done in the area of application and API security in the container environment to ensure protected operation in decentralised environments.

See the presentationSilvan Leuenberger (SOC, Head of Service Management Center) from terreActive explained how to protect yourself in the current threat situation with a SOC and threat detection and which services result from this. He explained how you can build up your cyber defence according to the modular system.

Agile Security

The Whitepaper from the congress "Agile Security" you can finde here (german only):

Study - App and API-Security in container environments

The study app and API-security in container environments you can find here:

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge