CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.
This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.
While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.
This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.
While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.
This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.
While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.
This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.