Don't miss this upcoming event hosted by NeuVector and our partners Rancher and Sonatype. How can organizations maintain application delivery velocity speed while ensuring data integrity? Automation is the key.
Some additional inforIn a previous blog, we discussed how a malicious actor can exploit CVE-2020-8554 to bypass Kubernetes' RBAC isolation and conduct a man-in-the-middle attack. We demonstrated the network connections between the victim and the attacker. In this blog, we show how NeuVector protects your applications against this Kubernetes vulnerability.mation in one line