Attacking and Defending Containers – Part 1
Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced containerization as part of the digital transformation.
We take a look at the synopsis of business challenges around the containers. We also delve into popular attack vectors that have been used to breach a container-based environment with the demonstration and discuss a high-level checklist from a security context to overcome the challenges.
What You’ll Learn:
- Why organizations choose to use containers
- Common security challenges when deploying containers
- Popular attack scenarios affecting your container ecosystem