Michael Levan

Michael Levan

PURPOSELY Exploiting A Kubernetes Cluster

Discover how attackers exploit Kubernetes clusters, from initial access to privilege escalation and lateral movement. Learn key techniques and defenses to strengthen your Kubernetes security posture.

Exploiting (Pentesting) An AWS EKS Cluster

Explore Kubernetes red teaming and penetration testing techniques to uncover vulnerabilities, assess cluster security, and strengthen containerized environments against real-world cyber threats.

AppSec: The Security Specialty That Rules Them All

Learn the fundamentals of application security, including best practices, common vulnerabilities, and how to protect your software from cyber threats. Stay ahead with expert insights and practical tips.

Configuring an AWS EKS Management Cluster

Working with and interacting with Kubernetes is very particular in the sense of how workloads are deployed and how engineers manage them. With the uniqueness may come the need to have one cluster

Creating and Mounting Azure File Shares

Discover the power of Azure File Shares and Azure Storage for scalable, secure cloud file sharing and data management. Learn how Microsoft Azure enhances business productivity with high-availability, hybrid cloud capabilities, and seamless integration.