Putting Hackers Breaching Your Cluster in Automatic Quarantine
CNCF [Cloud Native Computing Foundation] via YouTube
Power BI Fundamentals - Create visualizations and dashboards from scratch
All Coursera Certificates 40% Off
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical cybersecurity presentation that addresses the inevitable nature of hacker breaches and introduces an innovative solution for automatic quarantine. Learn about the vulnerabilities present in commonly used cloud native applications and how to secure them effectively. Dive into real-world scenarios demonstrating easily exploited back doors in cluster deployments, and discover a simple yet often overlooked blueprint for enhancing cluster resistance against malicious attacks. Gain valuable insights on protecting your resources, data, and reputation by automatically isolating attackers when they breach an application in your cluster, ensuring the safety of other cluster components.
Syllabus
Putting Hackers Breaching Your Cluster In Automatic Quarantine - Ziv Nevo, IBM
Taught by
CNCF [Cloud Native Computing Foundation]