Greg Castle

@mrgcastle

Security for Google Kubernetes Engine | Former pentester, DFIR and OS X security | he/him

Vrijeme pridruživanja: srpanj 2010.

Tweetovi

Blokirali ste korisnika/cu @mrgcastle

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mrgcastle

  1. Prikvačeni tweet
    22. stu 2019.
    Poništi
  2. 11. sij
    Poništi
  3. 11. sij
    Poništi
  4. 10. pro 2019.

    A lot to consider when attempting to isolate a compromised workload in . Here we give advice on how to do it on GKE to minimize impact on other workloads using cordon, drain, firewalls, and avoid traps like node auto-repair happening mid-investigation.

    Poništi
  5. 3. pro 2019.

    Thanks so much! It was fun to work on :)

    Poništi
  6. 28. stu 2019.

    May the packets flow and the pagers remain silent. Wishing good luck for y'all.

    Poništi
  7. 21. stu 2019.

    AMAZING guided hacking workshop by . They presented highly entertaining and educational attack/defence scenarios. Many knowledge bombs dropped in a room full of warm fuzzy hacker vibes. Congrats!

    Poništi
  8. 21. stu 2019.

    It's going to be a completely full house for CTF!

    Poništi
  9. 20. stu 2019.

    If you're trying to come see talk about API stuff you need to go to the Marriott Marquis next door due to the power outage. Please come!

    Poništi
  10. 20. stu 2019.
    Poništi
  11. 20. stu 2019.

    For those wanting to learn more about isolation with gvisor, this is a great intro written for a security audience.

    Poništi
  12. 19. stu 2019.

    Just gave a talk on breaking node isolation with at . It was a really fun talk to write! Recordings will take a while so we recorded a quick recap of the main takeaways, see it here: Slides are here:

    Poništi
  13. 18. stu 2019.

    Updated GKE hardening guide with new security features and new section "secure defaults". Our goal: move as many items to secure defaults as possible. There are also many more secure defaults set behind the scenes that are not in this list.

    Poništi
  14. 18. stu 2019.

    After listening to and you probably really want podsecuritypolicy. Come to the sig-auth update with and Mo Khan to talk about where it is at, why it is hard to use, and what the plan is.

    Poništi
  15. proslijedio/la je Tweet

    Understanding the importance of container security is no longer isolated to security people. Just in time for your flight to , we've published an ebook on the fundamental concepts of container security, and why they matter to your business:

    Poništi
  16. 13. stu 2019.

    My third year presenting attacks and defences at ! I'm honored to be back and excited about the attack chain and I have cooked up to beat node isolation. Come see us weaponize static pods and replica sets :) add us to your schedule!

    Poništi
  17. 8. stu 2019.

    I missed this in person, but had a great chat with Jay about k8s security at bluehat later on. Looking forward to watching it!

    Poništi
  18. 31. lis 2019.

    GKE secrets encryption is now GA! Encrypt your secrets with a key you control in Cloud KMS. But there's more!You can now also attach disks encrypted with keys you manage in Cloud KMS, adding to the hardware level disk encryption that is on by default.

    Poništi
  19. proslijedio/la je Tweet
    10. lis 2019.

    I'm looking forward to giving an update on the State of Security in 2019 with Hoping to make this a tradition :)

    Poništi
  20. 9. ruj 2019.

    Things that make security people happy: replacing static shared keys with vTPM assertions. Super happy to launch this feature. It's the long-term fix for the escalation attack as described in my kubecon talk, and more.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·