Join us for a deep dive into the Linux internals that underpin container technologies. We will then explore various cloud and container attack vectors, such as supply chain attacks, misconfigured container images, container escape vulnerabilities, and exposed secrets. You will gain a well-rounded understanding of both the risks associated with cloud and container technologies, and the strategies to build a secure cloud computing environment.