Step into an engaging discussion with Kubernetes security experts as we explore how this container orchestration tool’s superpower in enabling scalable and available assets for organizations can be used against itself to pave a critical attack path into the underlying infrastructure. In this session, we dive into common weaknesses across Kubernetes clusters, the unique complexities stemming from…
↧