Your Kubernetes security checklist | Cyber Work Podcast
What should you do to ensure your Kubernetes setup is secure? Michael Foster, Cloud Native Advocate at StackRox, discusses the security documentation he is working on and his wish list for what’s next for Kubernetes in this clip from the Cyber Work Podcast.
– Watch the full episode: https://www.youtube.com/watch?v=KKGePS4hj9M
– Learn cybersecurity with our FREE Cyber Work Applied training series: https://www.infosecinstitute.com/learn/
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Michael Foster is a passionate tech enthusiast and open-source advocate with a multidisciplinary background. As a Cloud Native Advocate at StackRox, Michael understands the importance of building an inclusive community. Michael embraces all forms of automation, focusing on Kubernetes security, DevOps, and infrastructure as code. He is continually working to bridge the gap between tech and business and focus on sustainable solutions.
About Infosec
Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It’s our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
Видео Your Kubernetes security checklist | Cyber Work Podcast канала Infosec
– Watch the full episode: https://www.youtube.com/watch?v=KKGePS4hj9M
– Learn cybersecurity with our FREE Cyber Work Applied training series: https://www.infosecinstitute.com/learn/
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Michael Foster is a passionate tech enthusiast and open-source advocate with a multidisciplinary background. As a Cloud Native Advocate at StackRox, Michael understands the importance of building an inclusive community. Michael embraces all forms of automation, focusing on Kubernetes security, DevOps, and infrastructure as code. He is continually working to bridge the gap between tech and business and focus on sustainable solutions.
About Infosec
Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It’s our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
Видео Your Kubernetes security checklist | Cyber Work Podcast канала Infosec
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![What it takes to be a good Chief Technology Officer (CTO) | Cyber Work Podcast](https://i.ytimg.com/vi/UFNWOjh_pcU/default.jpg)
![Careers at Infosec | Join us in making the world more secure](https://i.ytimg.com/vi/Mmvy3YGbJ6s/default.jpg)
![How to carry out a watering hole attack | Free Cyber Work Applied series](https://i.ytimg.com/vi/JoPp4U5FowU/default.jpg)
![What skills are required to get hired on a security awareness team? | Cyber Work Podcast](https://i.ytimg.com/vi/7S3dQUv5E64/default.jpg)
![Cybersecurity’s role in U.S. foreign relations | Guest Tom Siu](https://i.ytimg.com/vi/jYTOb_SICMQ/default.jpg)
![Upskilling to deepen employee engagement and retention | Infosec Inspire 2020](https://i.ytimg.com/vi/-ji5aLwXyGQ/default.jpg)
![How JPMorgan Chase uses the NICE Framework to build custom work roles | Cyber Work Podcast](https://i.ytimg.com/vi/kV5T1N_F5WY/default.jpg)
![How to improve cloud security | Cyber Work Podcast](https://i.ytimg.com/vi/fSMJbZWC16Q/default.jpg)
![Ethics in AI and machine learning | Cyber Work Podcast](https://i.ytimg.com/vi/RJZ0pxcZsSQ/default.jpg)
![Solidifying your company’s ransomware defenses | Cyber Work Podcast](https://i.ytimg.com/vi/23gB3bqSVbo/default.jpg)
![How to avoid fraud and identity theft | Cyber Work Podcast](https://i.ytimg.com/vi/bfHb7rXzKL4/default.jpg)
![The future of data storage | Cyber Work Podcast](https://i.ytimg.com/vi/SeisiGz3r1s/default.jpg)
![Showing cybersecurity aptitude without job experience | Cyber Work Podcast](https://i.ytimg.com/vi/1BRxn6GQOG4/default.jpg)
![Working as a privacy professional | Cyber Work Podcast](https://i.ytimg.com/vi/JkMoygtQ_wo/default.jpg)
![How to carry out a watering hole attack | New FREE training series — Cyber Work Applied](https://i.ytimg.com/vi/nNzUg_gW1tI/default.jpg)
![How to work in security awareness | Cyber Work Podcast](https://i.ytimg.com/vi/h71f_jKZTeo/default.jpg)
![Inside the Pentagon's new zero-trust policy | Guest Steve Judd](https://i.ytimg.com/vi/jQxb6SmcDAo/default.jpg)
![How to conduct cross-industry collaboration in cybersecurity | Cyber Work Podcast](https://i.ytimg.com/vi/I-CYevdxSME/default.jpg)
![Secure coding is "worth its weight in gold" | Cyber Work Podcast | #shorts](https://i.ytimg.com/vi/FASdfHzg8mw/default.jpg)
![Your personal data is everywhere: What can you do about it? | Guest Mark Kapczynski](https://i.ytimg.com/vi/lKcgVvh9jcc/default.jpg)