Главная
Study mode:
on
1
Intro
2
Tabitha
3
Tabitha Sable
4
Set Comp Default
5
Finding a different vulnerability
6
What can you do
7
Old times
8
Open SSH 23
9
Open SSH 22
10
Testing
11
zag spike
12
who are these people
13
mailcat
14
mandatory commit signing
15
hijacking the images
16
congratulations
17
devopsy
18
Transformation
19
Math
20
Call me
21
Im ready
22
Wrap up
Description:
Dive into an action-packed presentation on advanced Kubernetes security techniques and strategies. Explore both common and sophisticated attack methods as Ellen Körbes and Tabitha Sable demonstrate live hacking and defense scenarios. Learn how to leverage Kubernetes as a platform to enhance your security practices, including addressing software supply chain vulnerabilities. Gain insights into utilizing Kubernetes beyond its traditional deployment and scaling functions to fortify your overall security posture. Walk away with inspiration and practical knowledge to elevate your approach to Kubernetes security and tackle contemporary challenges in the cloud-native landscape.

Beyond Kubernetes Security

CNCF [Cloud Native Computing Foundation]
Add to list