Ep 119: What is a Microservice Architecture and how do I secure it?
Listen now
Description
Whatever kind of software application a team is building, the identification and remediation of cybersecurity issues needs to be part of every stage of the software development lifecycle (SDLC). But making that happen takes a wealth of skills and approaches, as well as an eye on compliance and the ability to keep pace with the ever-changing online environment—microservices being a prime example. In this episode, your host John Verry, Pivot Point Security CISO and Managing Partner, sits down with Laura Bell Main, CEO and Founder of SafeStack to give business and security leaders a clear and logical overview of microservice security issues and more. In this episode, join us as we discuss: • What constitutes a microservice architecture and how it relates to other design approaches, languages, and frameworks • The microservice software supply chain and the limitations of a Software Bill of Materials in a microservices context • How using microservices changes the approach of securing an application • How zero trust concepts relate to microservice architectures • How SafeStack is helping to educate developers about application security in organizations of all sizes To hear this episode and many more like it, we encourage you to subscribe to the Virtual CISO Podcast. Just search for The Virtual CISO Podcast in your favorite podcast player or watch the Podcast on YouTube here. To stay updated with the newest podcast releases, follow us on LinkedIn here.
More Episodes
In this episode of The Virtual CISO Podcast, your host John Verry is joined by Mike Craig to break down the differences between FedRAMP, TxRAMP, AZRAMP, and StateRAMP. Together, they discuss:How the Naoris Protocol establishes decentralized trust for compute endpoints.  Key distinctions between...
Published 10/17/24
Published 10/17/24
In this episode of The Virtual CISO Podcast, your host, John Verry, sits down with David Carvalho, a cryptography and cybersecurity expert with over 25 years of experience, to explore the next frontier in cybersecurity: decentralized security models and post-quantum cryptography. How the Naoris...
Published 09/23/24