Posted on
in Presentations
Containers are everywhere nowadays. Every industry uses them in software development practices. Cybercriminals are not left behind. They are incorporating containers for developing, integrating, and deploying their infrastructure. This session will cover how threat actors are using containers in all possible ways, from running in free SaaS services and fake/stolen Cloud accounts to compromised systems.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community