Infecting container images to spread in large-scale container-based infrastructures
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
How enabling a single vulnerable feature removed the entire network and identity perimeter around internet-isolated Azure Cognitive Search instances.
How a few common misconceptions about vulnerability patching and detection in software containers can give a false sense of security, and cause you to potent...