Talks
2025
- Hacking up a storm with Kubernetes
- Beyond the surface - exploring attacker persistence strategies in Kubernetes
- Containers Rule Everything Around Me
2024
- Fortifying Kubernetes
- Charting the Course - The History and Evolution of Kubernetes Security
- Observability for Pentesters
- You can only secure what you can see - How observability empowers security
2023
- The secret life of Kubernetes containers
- Containers for Pentesters
- Malicious Compliance - Reflections on Trusting Container Scanners
- Spec Driven Research for Fun and Profit
- The myriad paths to improving open source security
2022
- In theory, there’s no difference between practice and theory
- Admission control in Kubernetes
- Too Much to Choose – Making Sense of a Smorgasbord of Security Standard
- First Steps to Full Lifecycle Security with Open Source Tools
2021
- An Introduction to Container Hacking
- Cluster Wrangling. How to make Kubernetes clusters secure and usable
- Adventures in Container Vulnerability Scanning
- Exploiting a slightly peculiar volume configuration with SIG-Honk
- Getting Started with Kubernetes Security
2020
2019
2018
2016
2015
2013
2012
2011
- 10 years of application security
- Penetration testing must die
- Practical strategies for securing your web application