Attacking and Defending Containers – Part 1
Join us on an investigative journey to explore the digital transformation around containerization and the perspective of IT professionals who have embraced it. Along with a demonstration, we delve into attack vectors that have been used to breach a container-based environment, business challenges around containers, and a high-level security checklist to overcome those challenges.
What You’ll Learn:
- Why organizations choose to use containers
- Common security challenges regarding the deployment of containers
- Popular attack scenarios affecting your container ecosystem