2023 What Kubernetes Security Looks Like Today Series- DevSecOps

2023 What Kubernetes Security Looks Like Today Series- DevSecOps

Cloud Security Podcast - This month we are talking about "Kubernetes Security & KubeCon EU 2023" and for the first episode in this series, we spoke to Kirsten Newcomer (Kirsten's Linkedin). Kirsten Newcomer from Red Hat has been championing Kubernetes security and the role DevSecOps will play in helping improve security for Kubernetes implementations.


Episode ShowNotes, Links and Transcript on Cloud Security Podcast: ⁠⁠www.cloudsecuritypodcast.tv⁠⁠


FREE CLOUD BOOTCAMPs on ⁠⁠www.cloudsecuritybootcamp.com⁠⁠


Host Twitter: Ashish Rajan (⁠⁠@hashishrajan⁠⁠)

Guest Socials: Kirsten Newcomer (Kirsten's Linkedin)

Podcast Twitter - ⁠⁠@CloudSecPod⁠⁠ ⁠⁠@CloudSecureNews⁠⁠


If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠Cloud Security News ⁠⁠

- ⁠⁠Cloud Security BootCamp⁠⁠


Spotify TimeStamp for Interview Questions

(00:00) Introduction

(02:42) Word from our sponsors about Snyk Launch - find out more at snyk.io/events/snyklaunch

(03:08) A bit about Kristen Newcomer

(04:13) How has Kubernetes security evolved ?

(06:57) Is Kubernetes still popular?

(07:45) Why is Kubernetes still popular?

(0:58) Challenges with security Kubernetes

(15:35) How to work effectively with Kubernetes

(18:50) Adoption of IaC for security

(24:30) Maturity of Kubernetes Security

(29:24) Challenges with auditing Kubernetes

(31:55) How to approach Kubernetes security?

(35:08) Zero Trust and Kubernetes

(39:01) Is SBOM bringing more attention to Kubernetes?

(42:51) Where do people start with Kubernetes?

(45:41) Managed vs unmanaged Kubernetes?

(47:05) How you can reach out to Kristen!

See you at the next episode!

Jaksot(344)

5 Skills to Level Up Your Cloud Hacking

5 Skills to Level Up Your Cloud Hacking

BlackHat 2023 and Defcon 31 Roundup were the breeding ground for new and existing hackers to come together and share what to look out for in 2023 and 2024. The skills that stood out were - Identity - ...

7 Loka 202315min

Become a Cloud Native CISO in 2023

Become a Cloud Native CISO in 2023

Michael Piacente has been helping companies find Security Executives (CISO) for a long time for some household name companies like Lyft, Instacart, Airbnb and more . In episode we speak about his curr...

2 Loka 202337min

Software Supply Chain Controls for Terraform

Software Supply Chain Controls for Terraform

Understanding Software Supply Chain security threats for Terraform which has been the default for Infrastructure as Code is important. in this episode Mike Ruth is sharing his experience of working on...

21 Syys 202340min

Data Security RoadMap in 2023

Data Security RoadMap in 2023

DSPM or Data Security Posture Management with Yotam Segev from Cyera: Most security teams have known about data challenges in their organization and some of them are put in the too hard to solve right...

18 Syys 202317min

The Cloud to Code Dilemma - Let's Talk

The Cloud to Code Dilemma - Let's Talk

Is it code to cloud or cloud to code with Harshil Parikh from Tromzo: A lot of leaders today face the inevitable question of should i start with the code or the cloud first. Harshil Parikh from Tromzo...

9 Syys 202324min

CISO Perspective: Josh Lemos, CISO of Gitlab

CISO Perspective: Josh Lemos, CISO of Gitlab

Josh Lemos former CISO of Block and the current CISO of GitLab comes from a pentester background and made his way to become a CISO. We were lucky enough to interview him during the hacker summer camp ...

6 Syys 202320min

The Azure Cloud Security Pentesting Skills You NEED!

The Azure Cloud Security Pentesting Skills You NEED!

Karl Fosaaen, the author of Penetration Testing "Azure for Ethical Hacker" and the VP of Research at NetSPI, came as a guest to share why the penetration Test of a Web Application hosted on Azure Clou...

28 Elo 202329min

How to detect software supply chain attacks with Honeytokens?

How to detect software supply chain attacks with Honeytokens?

Can Honeytokens be used in your supply chain security? Turns out we can! We spoke to Mackenzie Jackson ( @advocatemack ) from  @GitGuardian  about the benefits of using Honeytokens, which organisation...

25 Elo 202319min