Posted on
in Presentations
In this coaching session, we will perform a live hack of a DC/OS environment demonstrating how a remote attacker could compromise your data center by interacting with your various orchestration tools including Mesos, Chronos and Marathon. You will see how a single vulnerability within a container can be used as an initial foothold to compromise every server within your data center.
Hackers & Threats
cloud security security operations risk & vulnerability assessment DevSecOps
Topic
Hackers & Threats
Subtopic
cloud security
security operations
risk & vulnerability assessment
DevSecOps
Share With Your Community