penetration-testing

Kubeletmein EKS (and other) Updates

Mar 5, 2021

What if you were the victim of a more sophisticated ransomware attack that stole your application source code? In this post we explore five things you can do to protect yourself against this kind of cyber attack