Threats targeting Kubernetes and how to defend against them
Attackers are continuously evolving their techniques to target Kubernetes, and are actively using Kubernetes and Docker functionality to compromise, gain required privileges, and add backdoor entry to container clusters. SOC teams need new Kubernetes-native security and observability tools to protect against external threat actors.
In this session, Manoj Ahuje (Tigera) talks about threat actors’ evolving capabilities and explains how to defend your Kubernetes environment against them. Watch the recording to learn about:
- Adversary behavior
- Threat actors targeting Kubernetes
- Primary security threats to Kubernetes environments
- Best practices to secure your clusters against attacks