Resources

Explore our library of videos, datasheets, and more to learn about cloud-native security observability

Deepfence Cloud Security Resources

Webinar

Demystifying Kubernetes Detection and Response

Webinar

Runtime Security Observability for Containerized Workloads

Webinar

Addressing Evolving Threat Models in Cloud Security with Open Source Software

Webinar

Understanding Attack Paths

Video

Deepfence: ThreatStryker Walkthrough

Webinar

Contextualizing Cloud Security

Guide

Security Observability: Cyberdefense’s New Frontier

Demo Video

Deepfence: ThreatMapper Introduction

Video

Find Flaws Before an Attacker Does with ThreatMapper 1.3

Video

Detect and Defeat the Log4j Vulnerability with Deepfence

Video

Equifax Then and Log4j Now – Reveal & Seall Off Attack Paths

Video

How to Install ThreatMapper in Kubernetes

Video

Open Source Cloud Native Security with ThreatMapper

Video

“Shift Left” Security at Operations? How Does That Work?

Video

90-sec Intro to ThreatMapper

Workshop on demand

Cloud Native Security Workshop

Datasheet

Unified Cloud Native Security Observability

Video

What’s New in ThreatMapper 1.2

Webinar on demand

How to D3FEND Against ATT&CKS and Save the Day in ThreatMapper 1.2

Slides

Stop the Heist: How to D3FEND Against ATT&CKS and Save the Day

Webinar on demand

Runtime Security Observability for AWS Fargate

Video

Hardening Your CI/CD Pipelines with GitOps and Continuous Security