Tuesday, November 19, 2019

2:00 p.m. ET / 11:00 a.m. PT

Thursday, December 5, 2019
2:00 p.m. ET / 11:00 a.m. PT

Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes.

While Docker is great at managing the lifecycle of these workloads, it’s not a security tool.

In this webcast, we will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection. We’ll also provide examples of what to watch for in your logs, cryptojacking and container breakout attempts among them.

Mike Broberg
Technical editor
Threat Stack
Ethan Hansen
Security Analyst
Threat Stack

Registration details:

By registering you are accepting our Privacy Policy and Terms of Use.

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.

(*) denotes required form field(s)