Infiltrating Kubernetes: Attacker Motives & Methods - Cory Sabol
Kubernetes Privilege Escalation: Container Escape == Cluster Admin?
Container and Kubernetes security policy design: 10 critical best practices
Verifying the Security of Your Kubernetes Clusters
Kubernetes Security Best Practices for DevOps
Part 1 Common Security Hurdles in Kubernetes & Active Directory | Eric Kuehn & Cory Sabol
sec4dev 2022 – Attacking Kubernetes managed environments – Johannes Bär
Hacking the Kubernetes Renaissance: Lowering Risk of Large-scale Deployments
I created ESXi Ransomware and it is scary easy!
Next-Gen K8s Threat Hunting: GenAI & eBPF | Michele Dodic & Francesco Sbaraglia | SREday London 2024
Attack Scenarios Reviewed
Zoom, Kubernetes, and Hacking - PSW #646
Application security meetup: Kubernetes Zero-Trust security
IAM The One Who Knocks
AWS re:Invent 2022 - Kubernetes and cloud-native data management with Kasten by Veeam (PRT213)
Preventing Cyberattacks with Trusted Image Registries
Secure Your Stack: 10 Policy-based Practices for Container & Kubernetes Security
Leveraging the Linux Kernel for Building a Zero-Trust Environment With... Marton Sereg & Zsolt Varga
Webinar: Istio- Security of the mesh and security in the mesh
DEF CON 32 - Grand Theft Actions Abusing Self Hosted GitHub Runners - Adnan Khan, John Stawinski