Piloting Around the Rocks: Avoiding Threats in Kubernetes - Robert Tonic & Stefan Edwards
Know Your Enemy: Mapping Security Risks Using Threat Matrix for Kuber... Yossi Weizman & Ram Pliskin
Knock Knock: Security threats with Kubernetes (Ukr version) - Igor Khoroshchenko, Stanislav Kolenkin
The Devil in the Details: Kubernetes’ First Security Assessment - Aaron Small & Jay Beale
Prepare to Be Boarded! A Tale of Kubernetes, Plunder, and Cryptobooty - James Condon, Lacework
Absolute AppSec Ep. #67 - Kubernetes Security with Stefan & Bobby
Threat Modeling De Kubernetes
Threat Modelling: Securing Kubernetes Infrastructure & Deployments - Rowan Baker, ControlPlane
Keynote: Hello From the Other Side: Dispatches From a Kubernetes Attacker - Ian Coldwater
Walls Within Walls: What if Your Attacker Knows Parkour? - Tim Allclair & Greg Castle, Google
Is There a Place for Performance Sensitive Workloads in Kubernetes?- Gergely Csatari & Levente Kale,
GrrCON 2019 2 04 Symbolically executing a fuzzy tyrant Lojikil
Multiple Networks for Kubernetes Workloads - Piotr Skamruk, CodiLime & Doug Smith, Red Hat
Did Kubernetes Make My p95s Worse? - Jian Cheung & Stephen Chan, Airbnb
Binary Authorization in Kubernetes - Aysylu Greenberg, Google & Liron Levin, Palo Alto Networks
Knative - The Security Platypus? - Ariel Shuper, Aqua Security
Stefan Edwards and Robert Tonic: Go-ing for an evening stroll
Absolute AppSec - Ep. #91 - Stefan Edwards
Absolute AppSec Ep. #11 - David Coursey & Stefan Edwards
Absolute AppSec Ep. #55 - Stefan Edwards ruins Testing