Webinar On-Demand

Anatomy of Container Attack Vectors and Mitigations

Investigative Journey: Anatomy of Container Attack Vectors and Mitigations

Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments, provide best practices and tools to mitigate them, and discuss associated business risks.

View this webinar and learn about: 

  • Key known vulnerabilities affecting the container ecosystem (Docker, Kubernetes, RunC);
  • Common configuration mistakes and human errors leading to attacks;
  • Attack vectors that include crypto-currency mining, data exfiltration, and denial of service;
  • Key steps and tools, including open source tools, to mitigate each attack, from the build stage through to run-time detection and response. 

Our speaker shares lessons learned and the path forward from his experience helping Fortune 500 enterprise secure against simple and sophisticated container targeted attacks.

View the Webinar