How Kubernetes Vulnerability is About the Challenges of Securing Distributed Microservices - Part 2

This post is the final part of a two-part series on analyzing recently found CVE-2018-1002105. In the last post, I covered the overview of Kubernetes (K8s) vulnerability (CVE-2018-1002105). Using an example API request flow, I explained how the vulnerability may lead to privilege escalation or anonymous access to K8s cluster using an example request flow.

2019 Predictions from Verizon Ventures Portfolio

As part of Verizon Ventures portfolio, The Fabric's Chief Scientist Prabakar Sundarrajan shared predictions on industry developments that will see happen in 2019. "True Potential of Cloud-Delivered Infrastructure"

The Germination of an Idea

One of the most asked about questions from Prabakar Sundarrajan and me is how we come up with new ideas. It is one of the most challenging questions to answer. My most honest answer though is 99% perspiration and 1% inspiration. One of the most asked about questions from Prabakar Sundarrajan and me is how we come up with new ideas. It is one of the most challenging questions to answer.