5 Ways to Detect Malicious Activity & Protect Your Kubernetes Workloads

Presented by

Manoj Ahuje, Threat Intelligence Research Engineer. Tigera

About this talk

Organizations are rapidly moving more and more mission-critical applications to Kubernetes and the cloud to reduce costs, achieve faster deployment times, and improve operational efficiencies. But security teams are struggling to achieve a strong security posture with Kubernetes and cloud-based resources because of the inability to apply conventional security practices in the cloud environment. Join Threat Intelligence Research Engineer, Manoj Ahuje, for this webinar where he will cover five different attack scenarios on cloud-based Kubernetes infrastructure, and how to catch these malicious activities at each stage with Calico Enterprise and Global Alerts, a new feature just released. Don’t miss this technical webinar, register to attend now.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (36)
Subscribers (3628)
Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to secure containers and applications with a least privileges model and defense in depth. Tigera’s technology is recognized and trusted as the de facto standard for Kubernetes network security.