Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of "human side-channels" in this 48-minute Black Hat conference talk. Delve into unintentional, non-physical identifiers generated by human behaviors and activities that can be used to uniquely identify or track individuals in the digital realm. Learn how these identifiers function, their potential applications in both attack and defense scenarios, and strategies for countering them. Gain insights into the implications of human side-channels for security and privacy, and understand their significance in the evolving landscape of digital identity. Presented by Matt Wixey, this talk challenges assumptions about digital anonymity and offers valuable knowledge for cybersecurity professionals, privacy advocates, and anyone interested in the intersection of human behavior and digital security.
Syllabus
Introduction
Thank you
Introductions
Check your assumptions
Kubernetes defaults
What is Kubernetes
What does Kubernetes mean
How does Kubernetes work
Kubernetes components
Kubernetes configuration
Kubernetes API
Apply
Pod Lifecycle
API Server
Pod Scheduling
Demonstration
Summary
Host Path
Docker
Pod
Takeaway
Lets play with it
Takeaways
Admission Control
Hide Security Policies
Pod Security Policies
Cluster Security Policies
Conclusions
Does Admission Control Fix Everything
Taught by
Black Hat