Say NO to Rules: Closing the container security gap with plug-and-play runtime protection

How to create a Redis service that spans multiple Kubernetes clusters

Top 3 Considerations for Container Scanning

Microsoft Azure: Hands-on AKS workshop: Zero-trust security controls for containers and Kubernetes to reduce attack surface

AWS Dev Days: Hands-on workshop: Detect and block container and network-based attacks in EKS

AWS Dev Days: Hands-on workshop: Shift-left security with Vulnerability Management in EKS

Microsoft Azure: Hands-on workshop: Container security in AKS

Hands-on workshop: Observability and risk mitigation techniques to secure containers and Kubernetes in AKS

AWS Dev Days: Hands-on EKS workshop: Achieving PCI, SOC2, HIPAA, NIST and GDPR compliance for containerized applications

Microsoft Azure: Hands-on workshop: Shift-left security with Vulnerability Management in AKS
