Modern workload security: Addressing the unique challenges of K8s
Kubernetes has rapidly become the de facto standard for container orchestration in modern software development. But rapid iteration often leads to security risks, including misconfigurations and supply chain attacks. Breaches often have a large blast radius, due to overly-privileged network, execution, and identity and access management (IAM) policies.
Watch this webinar to glean insights on how to run K8s with confidence, accelerating usage without compromising security and compliance controls. You’ll learn:
- Common K8s security mistakes and threat vectors (and how to avoid them)
- Tips to balance preventive efforts with reactive ones
- Best practices to address top security concerns, container image scanning, least-privilege strategies, and runtime breach detection to achieve speed and efficiency goals