Threat actors only need to find one gap in your Kubernetes and container infrastructure to access your crown jewels. Understanding suspicious activity is critical for better security–but Kubernetes is a new realm for many enterprises, and it’s always …
The talk will focus on increasing awareness about SBOM, a key buzzword in the wake of cyber-attacks, and discussing its importance, formats, and ways to generate, manage, and monitor SBOMs in different stages of SDLC.
This workshop aims to break the security myths about managed Kubernetes clusters & demos a takeover attack on an exposed EKS cluster with default configuration & insecure workloads.