• This event has passed.

By default, pods are not isolated.

This means that malicious actors once inside may wander freely throughout your kubernetes cluster.
During this session we’ll discuss the different attack vectors and how to mitigate.

– Intro to attacking kubernetes and applications
– Network policies, isolation and quarantining
– IDS and honeypots concepts

Watch Recorded Session

Subscribe to our newsletter

Get updates on webinars, blog posts, new releases and more!

Thanks for signing up. You must confirm your email address before we can send you. Please check your email and follow the instructions.


📣 Read our new O'Reilly eBook on Kubernetes Security and ObservabilityLearn more >>>