
Encore: LemonDucks evading detection.
CyberWire Daily
00:00
Docker Containers - What Are You Recommendations for Mitigating CPU Utilization?
Don't expose your cloud resources to the internet, right? So use zero of trust policies and principles to isolate that. Make sure API usages are authenticated. Configure Docker and Kubernetes runtime only look at signed images from a trusted registry. And then of course, monitor for your workloads, or any kind of rogue containers or high CPU utilization.
Play episode from 09:48
Transcript


