Episode 2: Security Challenges Of Moving From Monolith To Micro-Services

Episode 2 April 22, 2019 00:33:27
Episode 2: Security Challenges Of Moving From Monolith To Micro-Services
SilverLining IL
Episode 2: Security Challenges Of Moving From Monolith To Micro-Services

Apr 22 2019 | 00:33:27

/

Hosted By

Moshe Ferber Ariel Munafo

Show Notes

Attendees

Guest: Yuval Reut, 

Guest title:  CIO & CISO 

Company:  Riskified 

Micro-services can bring enormous benefits into the organizations – giving flexibility and driving innovation. But Micro-services are also challenging from a security point of view. In this podcast, Yuval Reut, CIO & CISO for Riskified, will share his experience of moving an entire monolith application to a group of integrated micro services.

Timing:

0:00 – 3:39 - intro and learning about Riskified

3:39 - 9:55 - CISO & CIO positions at SaaS startups

9:55 - 12:20 - moving from Monolith to Microservices – reasons for the move.

12:20 - 19:30 - technology challenges when moving to Micro services

19:30 - 25:00 - People challenges when moving to Micro services

25:00 – 29:35 - Process challenges when moving to Micro services       

29.40 – 33:00 - Summary and conclusions

Other Episodes

Episode 24

August 19, 2020 00:37:14
Episode Cover

Episode 24: Putting The Sec Into DevOps

Attendees Guest: Dima Revelis Guest title: Senior Devops engineer Company: MoonActive Abstract DevsecOps is accelerating fast as the new buzzword for modern information security...

Listen

Episode 54

September 21, 2022 00:31:04
Episode Cover

SilverLining Episode 54: Threats on CI/CD pipeline

Guest: Guy Flechter Guest Title: CEO & Co-Founder at Cider Security Topic: Threats on CI/CD pipeline  Language: English   Abstract The main attraction point in...

Listen

Episode 37

April 13, 2021 00:27:16
Episode Cover

SilverLining Episode 37: Software Package Dependencies Attacks

Attendees Guest: Tzachi Zornstain Guest Title: Co-Founder & CEO, Dustico Topic: Software Package Dependencies Attacks Abstract Supply chain and software dependencies attacks are becoming...

Listen