Overview
Learn how to generate Vulnerability Exploitability eXchange (VEX) documents using Kubescape in this 21-minute tutorial. Explore the process of creating VEX documents to enhance vulnerability management and improve security practices in cloud-native environments. Gain insights into leveraging Kubescape's capabilities for effective vulnerability assessment and mitigation strategies.
Syllabus
Generating VEX documents with Kubescape
Taught by
CNCF [Cloud Native Computing Foundation]