Kubernetes has rapidly become the de facto standard for container orchestration in modern software development. But rapid iteration often leads to security risks, including misconfigurations and supply chain attacks. Breaches often have a large blast radius, due to overly-privileged network, execution, and identity and access management (IAM) policies.
In this webinar, you'll glean insights on how to run K8s with confidence, accelerating usage without compromising security and compliance controls.
Attendees will learn:
• Common K8s security mistakes and threat vectors (and how to avoid them)
• Tips to balance preventive efforts with reactive ones
• Best practices to address top security concerns, container image scanning, least-privilege strategies, and runtime breach detection to achieve speed and efficiency goals