2023 What Kubernetes Security Looks Like Today Series- DevSecOps

2023 What Kubernetes Security Looks Like Today Series- DevSecOps

Cloud Security Podcast - This month we are talking about "Kubernetes Security & KubeCon EU 2023" and for the first episode in this series, we spoke to Kirsten Newcomer (Kirsten's Linkedin). Kirsten Newcomer from Red Hat has been championing Kubernetes security and the role DevSecOps will play in helping improve security for Kubernetes implementations.


Episode ShowNotes, Links and Transcript on Cloud Security Podcast: ⁠⁠www.cloudsecuritypodcast.tv⁠⁠


FREE CLOUD BOOTCAMPs on ⁠⁠www.cloudsecuritybootcamp.com⁠⁠


Host Twitter: Ashish Rajan (⁠⁠@hashishrajan⁠⁠)

Guest Socials: Kirsten Newcomer (Kirsten's Linkedin)

Podcast Twitter - ⁠⁠@CloudSecPod⁠⁠ ⁠⁠@CloudSecureNews⁠⁠


If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠Cloud Security News ⁠⁠

- ⁠⁠Cloud Security BootCamp⁠⁠


Spotify TimeStamp for Interview Questions

(00:00) Introduction

(02:42) Word from our sponsors about Snyk Launch - find out more at snyk.io/events/snyklaunch

(03:08) A bit about Kristen Newcomer

(04:13) How has Kubernetes security evolved ?

(06:57) Is Kubernetes still popular?

(07:45) Why is Kubernetes still popular?

(0:58) Challenges with security Kubernetes

(15:35) How to work effectively with Kubernetes

(18:50) Adoption of IaC for security

(24:30) Maturity of Kubernetes Security

(29:24) Challenges with auditing Kubernetes

(31:55) How to approach Kubernetes security?

(35:08) Zero Trust and Kubernetes

(39:01) Is SBOM bringing more attention to Kubernetes?

(42:51) Where do people start with Kubernetes?

(45:41) Managed vs unmanaged Kubernetes?

(47:05) How you can reach out to Kristen!

See you at the next episode!

Episoder(346)

Ransomware attacks in AWS

Ransomware attacks in AWS

In this episode of the Virtual Coffee with Ashish edition, we spoke with Nandesh Guru (Nandesh's Linkedin) about ransomware and supply chain attack mechanisms in AWS and how the world of CSPM have evo...

6 Nov 202237min

How to become a Cloud Native Security Architect?

How to become a Cloud Native Security Architect?

In this episode of the Virtual Coffee with Ashish edition, we spoke with Christophe Parisel (Christophe's Linkedin) about what how to transition from being a technical architect on premise to a cloud ...

30 Okt 202250min

Compliance as Code in Kubernetes

Compliance as Code in Kubernetes

In this episode of the Virtual Coffee with Ashish edition, we spoke with Jim Bugwadia (Jim's Twitter) about policy management and compliance as code for Kubernetes and how you can use open source tool...

24 Okt 202246min

Software Signing for Kubernetes Supply Chain & Everybody Else

Software Signing for Kubernetes Supply Chain & Everybody Else

In this episode of the Virtual Coffee with Ashish edition, we spoke with Luke Hinds (Luke's Twitter) the open source Sigstore project and how it is helping with software signing and protecting the sof...

16 Okt 202250min

KUBERNETES BEST PRACTICES 2022

KUBERNETES BEST PRACTICES 2022

In this episode of the Virtual Coffee with Ashish edition, we spoke with Jimmy Mesta (Jimmy's Twitter) about OWASP Kubernetes Top 10 and best practices for securing Kubernetes Episode ShowNotes, Link...

10 Okt 202250min

Building Blocks of a Modern Cloud Security Program

Building Blocks of a Modern Cloud Security Program

Modern Cloud Security Programs hire for builders who can develop tools that help developers walk down a Paved road where security is not a blocker but at the same time prevents developers from making ...

29 Sep 202239min

THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 2

THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 2

Azure Cloud Security Architecture (Day 0) ,Custom Azure Role definitions, Azure Privilege Access Management etc can be complex to build. Continuing from part 1 In the part 2 of our This is My Cloud Se...

25 Sep 20221h 4min

SecDataOps Explained - Modern Security Stack

SecDataOps Explained - Modern Security Stack

Data Lakes as an asset to collect and build threat actors or hiring for Data Scientists/Analyst are not typical things in Cloud Security well unless the organisation is dealing with PetaBytes of data....

16 Sep 202247min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
energi-og-klima
teknisk-sett
nasjonal-sikkerhetsmyndighet-nsm
tomprat-med-gunnar-tjomlid
elektropodden
fornybaren
shifter
teknologi-og-mennesker
rss-impressions-2
smart-forklart
rss-ai-forklart
rss-polypod
rss-alt-vi-kan
pedagogisk-intelligens
rss-ki-praten
rss-fjorsilkebris-podcast
rss-forenklingspodden
rss-alt-som-gar-pa-strom