Media Summary: Join us for an insightful exploration into the significance of I am proud and honored to share my research and OWASP-based In cloud-native environments in general, and

Securing The Serverless Era Network - Detailed Analysis & Overview

Join us for an insightful exploration into the significance of I am proud and honored to share my research and OWASP-based In cloud-native environments in general, and Microsoft Defender for Cloud is introducing You can find more resources and articles about The business and technical benefits of AWS Lambda have driven rapid, broad adoption. As AWS Lambda applications gain ...

Mark Nunnikhoven, Vice President, Cloud Research, Trend Micro, Inc. In this session, learn how to adopt Zero Trust alongside traditional Writing and updating Suricata rules for AWS

Photo Gallery

Securing the Serverless Era: Network Security on AWS with Laurent Mathieu
Learn Serverless TOP 10 security issues in 40 minutes
Serverless Security: Your Code, Your Responsibility - Ory Segal
AWS re:Invent 2025 - Implementing security best practices for serverless applications (CNS360)
AWS re:Invent 2024 - Implementing security best practices for serverless applications (SVS324)
AWS re:Invent 2020: Network security for serverless workloads
Serverless Security
AWS re:Invent 2020: Best practices for securing your serverless applications
AWS re:Inforce 2019: Securing Serverless and Container Services (SDD306)
AWS re:Inforce 2019: Securing Enterprise-Grade Serverless Applications (SDD401)
Webinar: Securing Your Serverless Journey
Securing enterprise-level Serverless applications
View Detailed Profile
Securing the Serverless Era: Network Security on AWS with Laurent Mathieu

Securing the Serverless Era: Network Security on AWS with Laurent Mathieu

Join us for an insightful exploration into the significance of

Learn Serverless TOP 10 security issues in 40 minutes

Learn Serverless TOP 10 security issues in 40 minutes

I am proud and honored to share my research and OWASP-based

Serverless Security: Your Code, Your Responsibility - Ory Segal

Serverless Security: Your Code, Your Responsibility - Ory Segal

In cloud-native environments in general, and

AWS re:Invent 2025 - Implementing security best practices for serverless applications (CNS360)

AWS re:Invent 2025 - Implementing security best practices for serverless applications (CNS360)

Discover how to maximize

AWS re:Invent 2024 - Implementing security best practices for serverless applications (SVS324)

AWS re:Invent 2024 - Implementing security best practices for serverless applications (SVS324)

Building with

AWS re:Invent 2020: Network security for serverless workloads

AWS re:Invent 2020: Network security for serverless workloads

Are you building a

Serverless Security

Serverless Security

Microsoft Defender for Cloud is introducing

AWS re:Invent 2020: Best practices for securing your serverless applications

AWS re:Invent 2020: Best practices for securing your serverless applications

This session explores how to think about

AWS re:Inforce 2019: Securing Serverless and Container Services (SDD306)

AWS re:Inforce 2019: Securing Serverless and Container Services (SDD306)

Most customers are uncertain of how to

AWS re:Inforce 2019: Securing Enterprise-Grade Serverless Applications (SDD401)

AWS re:Inforce 2019: Securing Enterprise-Grade Serverless Applications (SDD401)

Serverless

Webinar: Securing Your Serverless Journey

Webinar: Securing Your Serverless Journey

With

Securing enterprise-level Serverless applications

Securing enterprise-level Serverless applications

You can find more resources and articles about

What is Serverless?

What is Serverless?

Learn more about

AWS re:Invent 2022 - Developing and deploying secure AWS Lambda applications (PRT094)

AWS re:Invent 2022 - Developing and deploying secure AWS Lambda applications (PRT094)

The business and technical benefits of AWS Lambda have driven rapid, broad adoption. As AWS Lambda applications gain ...

Securing Serverless Applications in the Cloud

Securing Serverless Applications in the Cloud

Mark Nunnikhoven, Vice President, Cloud Research, Trend Micro, Inc.

Protecting Against OWASP Serverless Top Ten - David Melamed

Protecting Against OWASP Serverless Top Ten - David Melamed

Sponsored Lightning Talk - Jit.

AWS re:Inforce 2025 - Integrate Zero Trust into your cloud network (NIS304)

AWS re:Inforce 2025 - Integrate Zero Trust into your cloud network (NIS304)

In this session, learn how to adopt Zero Trust alongside traditional

AWS re:Invent 2025 - Automating Suricata rules for AWS network firewall (DEV206)

AWS re:Invent 2025 - Automating Suricata rules for AWS network firewall (DEV206)

Writing and updating Suricata rules for AWS

Securing Serverless by breaking in by Simon Maple

Securing Serverless by breaking in by Simon Maple

Serverless

AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at Layer 7 (SAC310)

AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at Layer 7 (SAC310)

AWS