Attacking and defending Kubernetes

Logo
Presented by

Andy Wirtz, Senior IT-Consultant, ATIX AG

About this talk

- cryptojacking and data breaches are the result of popular attacks on Kubernetes, - the attack vectors and the complete path of an attack will be shown in a demo, - Kubernetes mechanisms and additional open-source-tools for defending the clusters will be explained.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (31)
Subscribers (323)
Open source solutions and IT automation are central topics of this channel. In various webinars, our specialists address current topics on various open-based tools (Kubernetes, Ansible, Openshift, Puppet...). By using these tools correctly, users can automate processes as well as infrastructure in a targeted manner and thus gain great advantages through less work, lower error rates significant time savings. These live, interactive webinars will feature: -> High-level overviews -> Technical demonstrations -> Vendor-independent user stories. The live webinars will be made available on Brighttalk ondemand after broadcast.