Finding Critical Threats in K8s Audit Logs
CTO & Co-founder, Alcide
Is collecting logs an everyday security practice in your organization? With so many moving parts: operators, controllers and in-cluster components, it becomes crucial. Join this session to learn about how Kubernetes Audit logs can be utilized to enhance the security of Kubernetes based deployments.