Attacking and Defending Containers – Part 1

Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation. You’ll look at the synopsis of business challenges around the containers. Further, we will delve into popular attack vectors that have been used to breach a container-based environment with the demonstration and discuss a high-level checklist from a security context to overcome the challenges. We will explore these topics: • Why organizations choose to use containers • Common security challenges when deploying containers • Popular attack scenarios affecting your container ecosystem

Previous Video
Engaging Developers to Scale Threat Modeling
Engaging Developers to Scale Threat Modeling

Threat modeling can lead to conflicts between security experts and developers as it's time-consuming and de...

Next Video
Delivering and scaling secure microservice-based products for any-cloud*
Delivering and scaling secure microservice-based products for any-cloud*

Many large enterprises and government units prefer to run applications in private clouds, and cannot accept...