Explore the challenges and solutions in vulnerability management for container images in this conference talk. Learn how vulnerability scanners work, their limitations, and practical approaches to assess product security beyond raw vulnerability numbers. Discover strategies for implementing effective vulnerability management using Kubernetes images as an example. Gain insights into reducing false positives, focusing on code execution paths, and creating automated processes for vulnerability detection. Understand the complexities of container images and how to balance security concerns with practical solutions that allow engineers to work efficiently.
Keeping Up with CVEs: Finding Needles in Haystacks - Practical Vulnerability Assessment