Jan. 18, 2024, 3:44 p.m. | Madhav Nakar

The Red Canary Blog: Information Security Insights redcanary.com

Kubernetes has emerged as the de facto framework for container orchestration, but its widespread adoption has introduced new attack vectors.

adoption attack attack vectors container container orchestration framework kubernetes kubernetes security orchestration security

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden