Investigative Journey: Anatomy of Container Attack Vectors and Mitigations
Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments, provide best practices and tools to mitigate them, and discuss associated business risks.
View this webinar and learn about:
- Key known vulnerabilities affecting the container ecosystem (Docker, Kubernetes, RunC);
- Common configuration mistakes and human errors leading to attacks;
- Attack vectors that include crypto-currency mining, data exfiltration, and denial of service;
- Key steps and tools, including open source tools, to mitigate each attack, from the build stage through to run-time detection and response.
Our speaker shares lessons learned and the path forward from his experience helping Fortune 500 enterprise secure against simple and sophisticated container targeted attacks.