Sep 20, 2018 | Presentations, Webinars
Bad actors will target our Linux systems. With a small amount of effort, we can detect their first access to the system and stop them before they move laterally throughout. But how did they get into our systems in the first place? And what are the procedures for a...
Sep 14, 2018 | Kubernetes, Videos
In this talk, we will demonstrate attacks on Kubernetes clusters, discuss defenses, then demonstrate how those defenses break the attacks. Come begin your training in Kubernetes attack and defense! The number of companies moving to a microservices model appears to be...