What are the challenges of implementing security in Kubernetes environments?
What are the approaches you have seen out there?
Scan for vulnerabilities pre-deployment (CI/CD)
Continuously check compliance and audit changes across the stack
Block runtime threats and attacks
Respond to incidents and conduct forensics on Kubernetes
Use cases when monitoring and security come together
Can you tell me a bit more about the open source project Falco?
[caption id="attachment_210" align="alignleft" width="120"] Matt Alderman - CEO[/caption]
[caption id="attachment_210" align="alignleft" width="120"] Paul Asadoorian - Founder & CTO[/caption]
[caption id="attachment_210" align="alignleft" width="120"] Jorge Salamero - Director of Product Marketing[/caption]
We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand