This webcast is pre-recorded. However, the recording will not be available until after the broadcast.
You've been hacked. A developer leveraged a 3rd party library with unsanitized input that a SCA tool can't flag. This containerized application goes into production ' making your entire cloud infrastructure vulnerable to severe security incidents. Does this sound familiar?
We will demonstrate and deconstruct a full-stack attack in a containerized application ' from the app layer, EC2 layer, to the cloud management console. Then, we will discuss how you can proactively identify the risk and remediation guidance for developers. Tune in to watch this step-by-step attack unfold and how to reduce your own attack surface.