Resources
Explore our library of videos, datasheets, and more to learn about cloud-native security observability
Deepfence Cloud Security Resources
Webinar

Demystifying Kubernetes Detection and Response
Webinar

Runtime Security Observability for Containerized Workloads
Webinar

Addressing Evolving Threat Models in Cloud Security with Open Source Software
Webinar

Understanding Attack Paths
Video

Deepfence: ThreatStryker Walkthrough
Webinar

Contextualizing Cloud Security
Guide

Security Observability: Cyberdefense’s New Frontier
Demo Video

Deepfence: ThreatMapper Introduction
Video

Find Flaws Before an Attacker Does with ThreatMapper 1.3
Video

Detect and Defeat the Log4j Vulnerability with Deepfence
Video

Equifax Then and Log4j Now – Reveal & Seall Off Attack Paths
Video

How to Install ThreatMapper in Kubernetes
Video

Open Source Cloud Native Security with ThreatMapper
Video

“Shift Left” Security at Operations? How Does That Work?
Video

90-sec Intro to ThreatMapper
Workshop on demand

Cloud Native Security Workshop
Datasheet

Unified Cloud Native Security Observability
Video

What’s New in ThreatMapper 1.2
Webinar on demand

How to D3FEND Against ATT&CKS and Save the Day in ThreatMapper 1.2
Slides

Stop the Heist: How to D3FEND Against ATT&CKS and Save the Day
Webinar on demand

Runtime Security Observability for AWS Fargate
Video

Hardening Your CI/CD Pipelines with GitOps and Continuous Security