Webinar: Journey to Kubernetes Security

March 31, 2020

In recent years, enterprises and developers have started adopting the idea of application modernization by migrating their apps to cloud, applying containerization, using a serverless architecture, and — most importantly — breaking down their monolithic applications into microservices. Kubernetes plays an important role in this adoption because of the advantages it offers: running and coordinating containerized services across a cluster of machines.

But as we developers are moving into this Kubernetes world, there is one thing we need to be careful of and i.e. security. Did you know that there are multiple attack vectors to a microservice architecture deployed using Kubernetes? Such as insecure pod to pod communication. If not encrypted properly, an attacker can get access to confidential information as the communication between different services happens over a network.

Join us for this webinar where we are going to discuss few security controls that we can use for our Kubernetes architecture including container image security, nodes security, container runtime security and using Istio for secure communication.

Pre-requisites:
1. Create your IBM Cloud Account at http://ibm.biz/kubernetes_security_webinar
2. Basic to intermediate knowledge of Kubernetes

Speaker Profile: https://www.linkedin.com/in/chandni-vaya-519a05137/

RSVP on Crowdcast NOW: https://www.crowdcast.io/e/journey-to-kubernetes/register

Want to put to good use what you learn here? Participate in a cause-worthy global online hackathon all by yourself or with a team at http://callforcode.org. Find out all about how developers can do their part by making the world a better place by tackling challenges like COVID-19 & Climate Change. The winning team can get up to $200,000 USD cash and see their solutions deployed in communities that need the most help!

Check out the resources & starter kits to kick-off your solution (https://developer.ibm.com/callforcode/) built, documented, and presented by expert technologists from IBM, including technical blog posts, tech talks, how-tos, and plenty of code!