07 Jun 2024
11:37 AM
- last edited on
28 Jun 2024
10:12 AM
by
Michal_Gebacki
📖 CHAPTERS 📖
-----------------------------
00:00 Introduction
01:38 Understanding Hacker Exploits and Defense Basics
08:53 Building Secure Applications and Containers
14:16 Implementing Restricted Permissions for Safety
21:53 Controlling Network Access Within Your Cluster
24:39 Limiting Resource Usage to Prevent DDoS Attacks
25:46 Utilizing Runtime Vulnerability Scanners
27:56 Key Takeaways and Final Thoughts
- - -
https://www.youtube.com/@isitobservable
Subscribe to DT YT channel
Stay up-to-date with Dynatrace! Follow us on Facebook, Instagram, LinkedIn, Twitter, Twitch