With the recent Kubernetes vulnerabilities, it has become clear that orchestration tools such as Kubernetes and Istio can be an attractive target for hackers. These systems need to be monitored and secured just as much as the application workloads which run on them.
Join Gary Duan, NeuVector co-founder and CTO, in this session for an overview of the attack surface of a container infrastructure, and how to protect against attacks with built-in security features of these tools combined with third party offerings which extend security for business critical deployments.