At AWS re:Invent 2023, a groundbreaking advancement in Kubernetes security was unveiled with the introduction of EKS Pod Identity. This talk will explore how this new feature is redefining authentication mechanisms within EKS clusters. We'll delve …
Engage in a Capture The Flag (CTF) experience within Amazon Elastic Kubernetes Service (EKS). This talk offers a concise overview of overcoming practical challenges in Kubernetes cluster management and security, as detailed in the blog Decoding EKS …
Threat actors only need to find one gap in your Kubernetes and container infrastructure to access your crown jewels. Understanding suspicious activity is critical for better security–but Kubernetes is a new realm for many enterprises, and it’s always …
Supply chain security is complex to solve in this real world. Numerous software with notable features is available for free of cost. The scary part is they come with unforeseen hidden baggage of security vulnerabilities, supply chain security & trust …
In our digital world, keeping our data safe is a big concern. As we use more and more AI tools, we need to make sure our sensitive information stays private. This talk will focus on how we can use something called "local AI model execution" to help …
Managing secrets & ensuring least-privilege access in Kubernetes can be complex tasks for security & DevOps teams. This talk aims to simplify these challenges by diving into Identity & Access Management (IAM) Roles for Service Accounts (IRSA) & …
New to AWS and eager to dive into it with a fun project? You're in the right place! This talk will explore on managing AWS IAM in GitOps style. We'll walkthrough integrating key AWS services like IAM, Lambda, EventBridge, CloudTrail, CloudWatch, ECR, …
An intentional vulnerable android application. Master Android Application Security by analyzing and overcoming advanced vulnerabilities in a real-world-like banking app
An intentional vulnerable android application. Master Android Application Security by analyzing and overcoming advanced vulnerabilities in a real-world-like banking app