CNCF Live Webinar - Thinking like a threat actor in your Kubernetes environments

Threat actors only need to find one gap in your Kubernetes and container infrastructure to access your crown jewels. Understanding suspicious activity is critical for better security–but Kubernetes is a new realm for many enterprises, and it’s always …

Practical DevSecOps - Runtime Security and Observability

Sneak peek into kernel, syscalls, ebpf, kprobes, runtime security, Kubernetes API server bypass, tetragon protection, bypassing protection & more.