Recent fallout from Kubernetes issues, like CVE-2018-1002105, expose the seriousness of API level vulnerability to data breaches and incidents. What should you do if an application on your K8s pod is compromised? We will talk about what DevOps best practices can help isolate, monitor, track, and apply control types that protect your organization.
Presented by:
Wallarm