Shift Left Security: How Developers can Assume Responsibility on their Apps
18:44
Cloud applications/microservices architecture require a shift left in responsibilities, both deployments and security aspects.
Related Videos
In DevNet Create 2021
-
Play video Watch how streaming telemetry, open-source tooling, and APIs turn into an amazing BBQ setup. DevNet Snack Minute Episode 42.
Watch how streaming telemetry, open-source tooling, and APIs turn into an amazing BBQ setup. DevNet Snack Minute Episode 42.
Join Matt and Kareem as they chat with Developer Advocate Quinn Snyder, as he demonstrates using streaming telemetry concepts and open-source tooling, along with some handy APIs, to achieve perfect data-driven outcomes and delicious meal results.
16:46
-
Play video Automated ESXi Installs
Automated ESXi Installs
Ever installed ESXi so many times that yellow console screen is burned into your eyes? Using basic DevNet concepts like Python, a Web Page, and APIs, this code enables mass ESXi deployments on Cisco Platforms without logging into an ESXi console.
8:17
-
Play video How to Python-ize the data from wireless network
How to Python-ize the data from wireless network
Cisco Wireless LAN Controller configuration files contain a lot of useful information. But basic Python knowledge with the WLC pythonizer tool will allow anyone to reach new heights in configuration analysis and wireless network operational data.
20:53
-
Play video Automate the Network with WEB GUI PYnetwork
Automate the Network with WEB GUI PYnetwork
It is a Web based Network Automation tool, Backend - flask, front-end React and Material UI and database is sqlite.
9:37
-
Play video Cisco Innovation Labs Tour
Cisco Innovation Labs Tour
Cisco Innovation Labs Tour
6:40
-
Play video Secure CN - Securing Cloud Native Applications
Secure CN - Securing Cloud Native Applications
Cloud-native application security involves balancing the benefits of cloud services in accelerating development while at the same time handling security in an adverse environment with more attack surfaces and opportunities for data breaches.
20:09