This means that malicious actors once inside may wander freely throughout your kubernetes cluster.
During this session we’ll discuss the different attack vectors and how to mitigate.
Intro to attacking kubernetes and applications
Network policies, isolation and quarantining
IDS and honeypots concepts
WATCH THE REPLAY
Join our mailing list​
Get updates on blog posts, workshops, certification programs, new releases, and more!