After the overflow: self-defense techniques of the Linux Kernel by Reinhard Kugler
Anyone involved in software development
SecDevOps has complex challenges: remote code execution vulnerabilities could lead to a takeover of the backend. Web hosters and Cloud providers have to deal with the extreme: remote code execution as a service by running user code (PHP, NodeJS, Go, dotnet, …).
What does the Linux Kernel provide to contain successful attacks other than a firewall, user separation and permissions? Do Docker containers really contain
Tags: Capabilties, App Armor/SeLinux, Filesystem Attributes, SecComp
The Program and all details can be found here: SBA Live Academy
About the SBA Live Academy
We are all asked to stay home for the time being.
Invest your home office time in further educating yourself with the SBA Live Academy:
- free of charge
- 3x / week (Tuesday, Wednesday & Thursday)
- 13.00 – 13.30
- 20-minute live talk with one of our IT & Information Security Experts
- Including Q&A on technical and organizational issues