SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe products and services businesses build, and support continue to evolve, and so does the infrastructure used to build these technologies. Containers have become a trendy way for developers to run their applications. This trend is primarily due to the ease of use, repeatability for deploying, and the resource reduction cost that happens when running a container-based environment. The unfortunate side effects of this tend to be seen on the security side, where developers pick container images based on keyword searches or "most-used" and do not have a straightforward way to see the risks the container image exposes based on the current threat environment. Although security tooling continues to advance around container security, the community is still creating a false sense of security by using outdated practices on their containers with little focus on the attacker’s perspective.