Does Container Security Have to be That Hard?

Logo
Presented by

Ell Marquez, NicoleFishbein

About this talk

New technologies like containers present new ways for cloud environments to be hacked. Each container is responsible for a specific service that is part of the entire application, resulting in increased data traffic and complex access control rules. This can also lead to misconfigurations, providing a door for attackers to penetrate our environments. In this webinar, Nicole Fishbein and Ell Marquez will explain the most common vectors attackers are using to target containers, with easy-to-implement strategies to defend against these emerging threats. Join the webinar and learn: - What are the common attack vectors for containers - Examples of container attacks - What you can do to prevent and secure your environment

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (24)
Subscribers (2521)
Revealing the "genetic" origins of software, Intezer introduces a new way to detect and respond to cyber threats. Intezer offers enterprises an advanced solution to detect modern cyber attacks, with deep context for effective incident response. For more information, visit www.intezer.com or follow the company on Twitter at @IntezerLabs.