This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Exploiting Vulnerabilities in Your Container Workloads with AWS
Container technologies enable you to build and scale applications more rapidly than ever before, but placing an application into a container doesn’t automatically make it secure. Applications can look and run as intended and still the components and configurations create new vulnerabilities and attack vectors that expose your application to potentially crippling security risks - and we’re going to show you just how easy these vulnerabilities are to exploit!
In this live hacking session, we’ll exploit an application as an attacker would to showcase some of the most common container vulnerabilities and how they expose your container application to a malicious actor. We’ll then show you clear remediation actions and best practices for each attack scenario. We'll also demonstrate how you can protect your application by automatically detecting container image vulnerabilities in registries like Amazon ECR and monitor Amazon EKS clusters for new vulnerabilities after deployment.
In this webinar, David Schott, Principal Partner Solutions Architect at Snyk, will demonstrate:
- Some of the most commonly known exploits in container application
- How best to plug vulnerability scanning into a container delivery pipeline
- How to efficiently remediate vulnerabilities and misconfigurations in container workload
- How to continuously monitor manifests for newly discovered vulnerabilities
Lead Partner Solutions
Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World, SearchAWS.com, and Stadium Tech Report.