Latest Talk
Catch Me If You Can: Uncovering Malicious Behavior in Container Images
The heavy reliance on third-party components in modern software development has significantly escalated the risk of supply chain attacks. Threat actors frequently exploit public container images to infiltrate organizations and distribute malware, tricking developers into downloading them. While vulnerability scanning provides a strong foundation for robust container security, alone it’s not enough to safeguard your…
On-demand Talks
Related topics: