{"id":1695,"date":"2018-06-28T01:51:30","date_gmt":"2018-06-28T08:51:30","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=1695"},"modified":"2020-02-04T19:15:38","modified_gmt":"2020-02-05T02:15:38","slug":"hacking-and-defending-a-kubernetes-based-application-part-of-the-beyondtrust-webinar-series","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/presentations\/hacking-and-defending-a-kubernetes-based-application-part-of-the-beyondtrust-webinar-series\/","title":{"rendered":"Hacking and Defending a Kubernetes-based Application (Part of the BeyondTrust webinar series)"},"content":{"rendered":"
Container orchestration tools are all the buzz right now. It almost seems like every company in the DevOps modality is either using or moving to Kubernetes, Docker Swarm, or one of their competitors.\u00a0In this on-demand webinar, InGuardians CTO, Jay Beale, will hack a Kubernetes cluster,<\/strong>\u00a0attacking a single service and moving on to complete compromise. Then he\u2019ll put on his white hat, demonstrating how you could prevent the cluster compromise.<\/p>\n Following Jay\u2019s demo-intensive introduction to Kubernetes hacking and hardening, BeyondTrust Product Manager, Martin Cannard, will demonstrate how DevOps teams can leverage privileged access management (PAM) security solutions to protect all parts of the orchestration stack.<\/p>\n <\/p>\n