<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>/talk/amsterdam-secure-software-development-meetup-cloud-security-meetup-amsterdam-jan-2023-practical-guide-to-kubernetes-security-for-developers/</loc><lastmod>2023-01-09T00:00:00+00:00</lastmod></url><url><loc>/talk/black-hat-asia-2023-a-practical-approach-to-breaking-pwning-kubernetes-clusters/</loc><lastmod>2023-01-09T00:00:00+00:00</lastmod></url><url><loc>/talk/def-con-trainings-bellevue-wa-2023-a-practical-approach-to-breaking-pwning-kubernetes-clusters/</loc><lastmod>2023-01-09T00:00:00+00:00</lastmod></url><url><loc>/</loc><lastmod>2023-01-09T00:00:00+00:00</lastmod></url><url><loc>/talk/northsec-2023-practical-approach-to-breaking-pwning-kubernetes-clusters/</loc><lastmod>2023-01-09T00:00:00+00:00</lastmod></url><url><loc>/event/</loc><lastmod>2023-01-09T00:00:00+00:00</lastmod></url><url><loc>/talk/a-practical-approach-to-breaking-pwning-kubernetes-clusters/</loc><lastmod>2022-12-05T00:00:00+00:00</lastmod></url><url><loc>/talk/all-day-devops-2022-scaling-kubernetes-security-with-kubernetes-goat/</loc><lastmod>2022-11-10T00:00:00+00:00</lastmod></url><url><loc>/talk/trust-bank-singapore-2022-attackers-perspective-on-hacking-kubernetes-clusters/</loc><lastmod>2022-10-21T00:00:00+00:00</lastmod></url><url><loc>/talk/thoughtworks-secconf-2022-scaling-your-organization-kubernetes-security/</loc><lastmod>2022-10-15T00:00:00+00:00</lastmod></url><url><loc>/talk/kubesec-webinar-series-2022-scaling-kubernetes-security-with-kubernetes-goat/</loc><lastmod>2022-10-04T00:00:00+00:00</lastmod></url><url><loc>/talk/goa-training-hacking-and-securing-kubernetes-clusters/</loc><lastmod>2022-06-26T00:00:00+00:00</lastmod></url><url><loc>/talk/defcon-30-a-practical-approach-to-breaking-pwning-kubernetes-clusters/</loc><lastmod>2022-06-14T00:00:00+00:00</lastmod></url><url><loc>/talk/microsoft-security-nl-kubernetes-goat-defenders-guide-to-kubernetes-security/</loc><lastmod>2022-06-13T00:00:00+00:00</lastmod></url><url><loc>/talk/owasp-global-appsec-eu-2022-training-hacking-and-securing-kubernetes-clusters/</loc><lastmod>2022-06-06T00:00:00+00:00</lastmod></url><url><loc>/talk/first-2022-kubernetes-goat-interactive-kubernetes-security-playground/</loc><lastmod>2022-05-13T00:00:00+00:00</lastmod></url><url><loc>/talk/a-practical-approach-to-breaking-pwning-kubernetes-clusters/</loc><lastmod>2022-05-10T00:00:00+00:00</lastmod></url><url><loc>/talk/berlin-training-hacking-and-securing-kubernetes-clusters/</loc><lastmod>2022-05-05T00:00:00+00:00</lastmod></url><url><loc>/talk/kubernetes-goat-interactive-kubernetes-security-playground-2022-edition/</loc><lastmod>2022-05-04T00:00:00+00:00</lastmod></url><url><loc>/talk/paloalto-bridgecrew-2022-kubernetes-goat-interactive-kubernetes-security-playground/</loc><lastmod>2022-03-23T00:00:00+00:00</lastmod></url><url><loc>/talk/black-hat-europe-2022-arsenal-kubernetes-goat-interactive-kubernetes-security-learning-playground/</loc><lastmod>2021-11-11T00:00:00+00:00</lastmod></url><url><loc>/talk/a-practical-approach-to-breaking-pwning-kubernetes-clusters/</loc><lastmod>2021-11-08T00:00:00+00:00</lastmod></url><url><loc>/talk/abn-amro-ciso-summit-2021-closing-keynote-attacking-your-container/</loc><lastmod>2021-10-28T00:00:00+00:00</lastmod></url><url><loc>/talk/kubernetes-goat-practical-approach-to-learn-kubernetes-security/</loc><lastmod>2021-10-28T00:00:00+00:00</lastmod></url><url><loc>/talk/kubesec-enterprise-vsummit-2021-kubernetes-goat-interactive-kubernetes-security-learning-playground/</loc><lastmod>2021-10-12T00:00:00+00:00</lastmod></url><url><loc>/project/cnsp/</loc><lastmod>2021-09-25T00:00:00+00:00</lastmod></url><url><loc>/tag/devops/</loc><lastmod>2021-09-25T00:00:00+00:00</lastmod></url><url><loc>/tag/infosec/</loc><lastmod>2021-09-25T00:00:00+00:00</lastmod></url><url><loc>/tag/pentest/</loc><lastmod>2021-09-25T00:00:00+00:00</lastmod></url><url><loc>/project/</loc><lastmod>2021-09-25T00:00:00+00:00</lastmod></url><url><loc>/tag/security/</loc><lastmod>2021-09-25T00:00:00+00:00</lastmod></url><url><loc>/tags/</loc><lastmod>2021-09-25T00:00:00+00:00</lastmod></url><url><loc>/tag/training/</loc><lastmod>2021-09-25T00:00:00+00:00</lastmod></url><url><loc>/talk/building-network-security-boundaries-in-kubernetes/</loc><lastmod>2021-08-21T00:00:00+00:00</lastmod></url><url><loc>/talk/kubernetes-goat-kubernetes-security-learning/</loc><lastmod>2021-08-06T00:00:00+00:00</lastmod></url><url><loc>/talk/kubernetes-goat-demolab-at-def-con-29/</loc><lastmod>2021-08-06T00:00:00+00:00</lastmod></url><url><loc>/talk/kubernetes-security-attackers-defenders/</loc><lastmod>2021-06-18T00:00:00+00:00</lastmod></url><url><loc>/talk/a-practical-approach-to-breaking-pwning-kubernetes-clusters/</loc><lastmod>2021-06-05T00:00:00+00:00</lastmod></url><url><loc>/talk/kubernetes-goat-interactive-kubernetes-security-learning-playground/</loc><lastmod>2021-06-04T00:00:00+00:00</lastmod></url><url><loc>/talk/closing-talk-practical-kubernetes-security-learning-using-kubernetes-goat/</loc><lastmod>2021-06-03T00:00:00+00:00</lastmod></url><url><loc>/talk/getting-started-with-your-journey-into-cloud-security/</loc><lastmod>2021-05-15T00:00:00+00:00</lastmod></url><url><loc>/talk/attackers-and-defenders-perspective-to-containers-and-kubernetes-security/</loc><lastmod>2021-05-07T00:00:00+00:00</lastmod></url><url><loc>/talk/cloud-security-podcast-kubernetes-goat-vulnerable-by-design/</loc><lastmod>2021-05-02T00:00:00+00:00</lastmod></url><url><loc>/talk/keynote-approaching-security-in-the-cloud-native-world/</loc><lastmod>2021-03-31T00:00:00+00:00</lastmod></url><url><loc>/talk/virtual-training-hacking-and-securing-kubernetes-clusters/</loc><lastmod>2021-03-01T00:00:00+00:00</lastmod></url><url><loc>/talk/a-practical-guide-to-writing-secure-dockerfiles/</loc><lastmod>2021-02-03T00:00:00+00:00</lastmod></url><url><loc>/tag/academic/</loc><lastmod>2020-12-13T00:00:00+00:00</lastmod></url><url><loc>/categories/</loc><lastmod>2020-12-13T00:00:00+00:00</lastmod></url><url><loc>/category/demo/</loc><lastmod>2020-12-13T00:00:00+00:00</lastmod></url><url><loc>/post/</loc><lastmod>2020-12-13T00:00:00+00:00</lastmod></url><url><loc>/post/getting-started/</loc><lastmod>2020-12-13T00:00:00+00:00</lastmod></url><url><loc>/tag/%E5%BC%80%E6%BA%90/</loc><lastmod>2020-12-13T00:00:00+00:00</lastmod></url><url><loc>/category/%E6%95%99%E7%A8%8B/</loc><lastmod>2020-12-13T00:00:00+00:00</lastmod></url><url><loc>/talk/breaking-kubernetes-clusters-like-a-hacker-securing-the-cloud-native-infrastructure-like-a-ninja/</loc><lastmod>2020-11-24T00:00:00+00:00</lastmod></url><url><loc>/talk/defenders-guide-to-cloud-native-infrastructure-security/</loc><lastmod>2020-08-21T00:00:00+00:00</lastmod></url><url><loc>/talk/container-hackfest-by-trend-micro-benchmark/</loc><lastmod>2020-08-20T00:00:00+00:00</lastmod></url><url><loc>/talk/kubernetes-goat-vulnerable-by-design-kubernetes-cluster-environment/</loc><lastmod>2020-08-09T00:00:00+00:00</lastmod></url><url><loc>/talk/monthly-meeting-kubernetes-goat/</loc><lastmod>2020-07-16T00:00:00+00:00</lastmod></url><url><loc>/talk/hacker-days-kubernetes-goat/</loc><lastmod>2020-06-27T00:00:00+00:00</lastmod></url><url><loc>/project/kubernetes-goat/</loc><lastmod>2020-06-08T00:00:00+00:00</lastmod></url><url><loc>/tag/devsecops/</loc><lastmod>2020-06-06T00:00:00+00:00</lastmod></url><url><loc>/tag/docker/</loc><lastmod>2020-06-06T00:00:00+00:00</lastmod></url><url><loc>/project/hacker-container/</loc><lastmod>2020-06-06T00:00:00+00:00</lastmod></url><url><loc>/tag/automation/</loc><lastmod>2020-05-15T00:00:00+00:00</lastmod></url><url><loc>/project/docker-security-checker/</loc><lastmod>2020-05-15T00:00:00+00:00</lastmod></url><url><loc>/tag/golang/</loc><lastmod>2020-05-15T00:00:00+00:00</lastmod></url><url><loc>/talk/defenders-guide-to-cloud-native-infrastructure-security/</loc><lastmod>2020-05-06T00:00:00+00:00</lastmod></url><url><loc>/tag/tools/</loc><lastmod>2020-04-13T00:00:00+00:00</lastmod></url><url><loc>/project/tools-tldr-run/</loc><lastmod>2020-04-13T00:00:00+00:00</lastmod></url><url><loc>/project/attacking-and-auditing-docker-containers-and-kubernetes-clusters/</loc><lastmod>2020-04-09T00:00:00+00:00</lastmod></url><url><loc>/tag/book/</loc><lastmod>2020-04-09T00:00:00+00:00</lastmod></url><url><loc>/project/breaking-and-pwning-apps-and-servers-aws-azure-training/</loc><lastmod>2020-04-09T00:00:00+00:00</lastmod></url><url><loc>/tag/cloud-security/</loc><lastmod>2020-04-09T00:00:00+00:00</lastmod></url><url><loc>/tag/docs/</loc><lastmod>2020-04-09T00:00:00+00:00</lastmod></url><url><loc>/tag/kubernetes/</loc><lastmod>2020-04-09T00:00:00+00:00</lastmod></url><url><loc>/tag/workshop/</loc><lastmod>2020-04-09T00:00:00+00:00</lastmod></url><url><loc>/talk/container-security-for-red-and-blue-teams/</loc><lastmod>2020-04-06T00:00:00+00:00</lastmod></url><url><loc>/talk/breaking-pwning-docker-containers-and-kubernetes-clusters/</loc><lastmod>2019-11-06T00:00:00+00:00</lastmod></url><url><loc>/talk/defenders-guide-to-container-infrastructure-security/</loc><lastmod>2019-11-27T00:00:00+00:00</lastmod></url><url><loc>/talk/breaking-pwning-docker-containers-and-kubernetes-clusters/</loc><lastmod>2019-10-25T00:00:00+00:00</lastmod></url><url><loc>/talk/container-security-for-red-and-blue-teams/</loc><lastmod>2019-09-25T00:00:00+00:00</lastmod></url><url><loc>/talk/breaking-and-pwning-docker-containers-and-kubernetes-clusters/</loc><lastmod>2019-08-15T00:00:00+00:00</lastmod></url><url><loc>/talk/breaking-and-pwning-docker-containers-and-kubernetes-clusters/</loc><lastmod>2019-06-14T00:00:00+00:00</lastmod></url><url><loc>/talk/defenders-guide-to-cloud-native-infrastructure-security/</loc><lastmod>2019-06-14T00:00:00+00:00</lastmod></url><url><loc>/talk/attacking-and-auditing-docker-containers-and-kubernetes-clusters/</loc><lastmod>2019-04-08T00:00:00+00:00</lastmod></url><url><loc>/talk/automated-defense-using-cloud-services-for-aws-azure-and-gcp/</loc><lastmod>2019-04-08T00:00:00+00:00</lastmod></url><url><loc>/talk/automated-defence-using-cloud-services-for-aws-azure-gcp/</loc><lastmod>2019-02-07T00:00:00+00:00</lastmod></url><url><loc>/talk/container-security-monitoring-using-open-source/</loc><lastmod>2018-12-10T00:00:00+00:00</lastmod></url><url><loc>/talk/attacking-auditing-docker-containers/</loc><lastmod>2018-12-05T00:00:00+00:00</lastmod></url><url><loc>/talk/continuous-security-monitoring-in-ci-and-cd-pipelines/</loc><lastmod>2018-12-05T00:00:00+00:00</lastmod></url><url><loc>/talk/attacking-auditing-docker-containers/</loc><lastmod>2018-12-05T00:00:00+00:00</lastmod></url><url><loc>/talk/container-security-monitoring-using-open-source/</loc><lastmod>2018-08-28T00:00:00+00:00</lastmod></url><url><loc>/tag/osint/</loc><lastmod>2018-08-21T00:00:00+00:00</lastmod></url><url><loc>/project/osint-viz-platform-reconvillage/</loc><lastmod>2018-08-21T00:00:00+00:00</lastmod></url><url><loc>/talk/attacking-auditing-docker-containers-using-open-source/</loc><lastmod>2018-07-11T00:00:00+00:00</lastmod></url><url><loc>/project/attacking-and-auditing-docker-containers/</loc><lastmod>2018-08-10T00:00:00+00:00</lastmod></url><url><loc>/talk/attacking-auditing-docker-containers/</loc><lastmod>2018-08-28T00:00:00+00:00</lastmod></url><url><loc>/talk/attacking-auditing-docker-containers-using-open-source/</loc><lastmod>2018-07-11T00:00:00+00:00</lastmod></url><url><loc>/talk/building-visualisation-platforms-for-osint-data-using-open-source-solutions/</loc><lastmod>2018-07-11T00:00:00+00:00</lastmod></url><url><loc>/talk/automated-defense-using-serverless-for-aws-azure-and-gcp/</loc><lastmod>2018-05-25T00:00:00+00:00</lastmod></url><url><loc>/talk/hands-on-introduction-to-modern-application-security/</loc><lastmod>2018-05-04T00:00:00+00:00</lastmod></url><url><loc>/talk/automated-defense-using-cloud-services-for-aws-azure-and-gcp/</loc><lastmod>2018-02-07T00:00:00+00:00</lastmod></url><url><loc>/project/hacked-emails/</loc><lastmod>2018-02-07T00:00:00+00:00</lastmod></url><url><loc>/talk/automated-defence-for-cloud-security-in-aws-using-serverless/</loc><lastmod>2017-10-27T00:00:00+00:00</lastmod></url><url><loc>/talk/modern-security-operations-aka-secure-devops/</loc><lastmod>2017-10-24T00:00:00+00:00</lastmod></url><url><loc>/talk/real-world-security-monitoring-automated-defence-for-almost-free/</loc><lastmod>2017-10-20T00:00:00+00:00</lastmod></url><url><loc>/talk/real-world-security-monitoring-automated-defence-for-almost-free/</loc><lastmod>2017-09-20T00:00:00+00:00</lastmod></url><url><loc>/talk/monitoring-defending-infrastructure-security-attacks/</loc><lastmod>2017-08-17T00:00:00+00:00</lastmod></url><url><loc>/tag/acknowledgements/</loc><lastmod>2017-07-01T00:00:00+00:00</lastmod></url><url><loc>/tag/advisories/</loc><lastmod>2017-07-01T00:00:00+00:00</lastmod></url><url><loc>/tag/bug-bounty/</loc><lastmod>2017-07-01T00:00:00+00:00</lastmod></url><url><loc>/tag/cve/</loc><lastmod>2017-07-01T00:00:00+00:00</lastmod></url><url><loc>/publication/</loc><lastmod>2017-07-01T00:00:00+00:00</lastmod></url><url><loc>/publication/security-vulnerabilities-acknowledgements/</loc><lastmod>2017-07-01T00:00:00+00:00</lastmod></url><url><loc>/publication/security-vulnerabilities-advisories/</loc><lastmod>2017-07-01T00:00:00+00:00</lastmod></url><url><loc>/tag/vulnerabilities/</loc><lastmod>2017-07-01T00:00:00+00:00</lastmod></url><url><loc>/talk/devops-principles-to-build-your-lean-startup/</loc><lastmod>2017-06-27T00:00:00+00:00</lastmod></url><url><loc>/talk/server-hardening-and-security-monitoring/</loc><lastmod>2017-06-22T00:00:00+00:00</lastmod></url><url><loc>/talk/an-introduction-to-containers-using-docker-and-using-it-for-security-automation/</loc><lastmod>2017-06-03T00:00:00+00:00</lastmod></url><url><loc>/project/introduction-to-containers/</loc><lastmod>2017-06-03T00:00:00+00:00</lastmod></url><url><loc>/talk/developers-guide-to-security-operations-introducing-devsecops/</loc><lastmod>2017-05-18T00:00:00+00:00</lastmod></url><url><loc>/talk/cloud-security-for-everyone/</loc><lastmod>2017-04-29T00:00:00+00:00</lastmod></url><url><loc>/talk/linux-security-internals/</loc><lastmod>2017-04-22T00:00:00+00:00</lastmod></url><url><loc>/talk/automated-infrastructure-security-monitoring-and-defence/</loc><lastmod>2017-02-23T00:00:00+00:00</lastmod></url><url><loc>/talk/automating-documentation-presentation-knowledge-base-using-markdown-zero-to-hero/</loc><lastmod>2017-02-11T00:00:00+00:00</lastmod></url><url><loc>/tag/markdown/</loc><lastmod>2017-01-30T00:00:00+00:00</lastmod></url><url><loc>/project/raneto-docker/</loc><lastmod>2017-01-30T00:00:00+00:00</lastmod></url><url><loc>/project/nullblr-bachaav-aismd/</loc><lastmod>2016-12-17T00:00:00+00:00</lastmod></url><url><loc>/tag/siem/</loc><lastmod>2016-12-17T00:00:00+00:00</lastmod></url><url><loc>/talk/automated-infrastructure-security-monitoring-defence/</loc><lastmod>2016-12-10T00:00:00+00:00</lastmod></url><url><loc>/talk/automated-infrastructure-security-monitoring-using-foss/</loc><lastmod>2016-11-15T00:00:00+00:00</lastmod></url><url><loc>/talk/infrastructure-security-monitoring/</loc><lastmod>2016-11-04T00:00:00+00:00</lastmod></url><url><loc>/talk/ninja-level-infrastructure-monitoring/</loc><lastmod>2016-10-20T00:00:00+00:00</lastmod></url><url><loc>/project/defcon24-infra-monitoring-workshop/</loc><lastmod>2016-08-11T00:00:00+00:00</lastmod></url><url><loc>/talk/ninja-level-infrastructure-monitoring-defensive-approach-to-security-monitoring-automation/</loc><lastmod>2016-08-06T00:00:00+00:00</lastmod></url><url><loc>/talk/node-js-security/</loc><lastmod>2016-07-16T00:00:00+00:00</lastmod></url><url><loc>/project/vulnerable-apps/</loc><lastmod>2016-06-03T00:00:00+00:00</lastmod></url><url><loc>/tag/ansible/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/project/awesome-devsecops/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/project/code-vigilant/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/tag/data-science/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/project/docker-data-science-toolbox/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/project/docker-datasploit/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/project/markdow-automation/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/project/security-automation-with-ansible2/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/tag/sysadmin/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/tag/windows/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/project/wincmdfu/</loc><lastmod>2016-04-27T00:00:00+00:00</lastmod></url><url><loc>/talk/keynote-web-cloud-security-in-the-real-world/</loc><lastmod>2016-02-03T00:00:00+00:00</lastmod></url><url><loc>/talk/my-bug-hunting-with-open-source/</loc><lastmod>2014-10-27T00:00:00+00:00</lastmod></url><url><loc>/talk/fun-profit-with-bug-bounties/</loc><lastmod>2014-07-26T00:00:00+00:00</lastmod></url><url><loc>/talk/basics-of-networking-live-demonstration/</loc><lastmod>2014-04-19T00:00:00+00:00</lastmod></url><url><loc>/talk/hardening-routers-and-swithches/</loc><lastmod>2014-03-29T00:00:00+00:00</lastmod></url><url><loc>/admin/</loc></url><url><loc>/publication_types/</loc></url></urlset>