What the most common Kubernetes security misconfigurations are and how to address them
How to mitigate risk with open-source tooling, from security scanners (Trivy) to strong centralized identity-based infrastructure access controls (Teleport Access Plane)
How to handle user authentication properly to prevent long-term damage