Attacking and Defending Containers – Part 1

May 8, 2020

Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation. You’ll look at the synopsis of business challenges around the containers. Further, we will delve into popular attack vectors that have been used to breach a container-based environment with the demonstration and discuss a high-level checklist from a security context to overcome the challenges.

We will explore these topics:

  • Why organizations choose to use containers
  • Common security challenges when deploying containers
  • Popular attack scenarios affecting your container ecosystem
Previous Video
Engaging Developers to Scale Threat Modeling
Engaging Developers to Scale Threat Modeling

In this webinar, we will discuss an approach where we leverage the help of Engineering to significantly inc...

Next Video
Delivering and scaling secure microservice-based products for any-cloud*
Delivering and scaling secure microservice-based products for any-cloud*

Many large enterprises and government units prefer to run applications in private clouds, and cannot accept...