{"id":4465,"date":"2023-04-26T21:57:06","date_gmt":"2023-04-27T04:57:06","guid":{"rendered":"https:\/\/zed.inguardians.com\/wp-content\/uploads\/2023\/04\/CSCO-W08-Attacking-and-Detecting-Attacks-on-Kubernetes-Clusters-1.pdf"},"modified":"2023-04-26T21:57:30","modified_gmt":"2023-04-27T04:57:30","slug":"csco-w08-attacking-and-detecting-attacks-on-kubernetes-clusters-1","status":"inherit","type":"attachment","link":"https:\/\/zed.inguardians.com\/presentations\/attacking-and-detecting-attacks-on-kubernetes-clusters-rsa2023\/attachment\/csco-w08-attacking-and-detecting-attacks-on-kubernetes-clusters-1\/","title":{"rendered":"Attacking-and-Detecting-Attacks-on-Kubernetes-Clusters"},"author":7,"comment_status":"open","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":""},"description":{"rendered":"

Attacking-and-Detecting-Attacks-on-Kubernetes-Clusters<\/a><\/p>\n"},"caption":{"rendered":"

Attacking-and-Detecting-Attacks-on-Kubernetes-Clusters<\/p>\n"},"alt_text":"","media_type":"file","mime_type":"application\/pdf","media_details":{"filesize":1449194,"sizes":{}},"post":4464,"source_url":"https:\/\/zed.inguardians.com\/wp-content\/uploads\/2023\/04\/CSCO-W08-Attacking-and-Detecting-Attacks-on-Kubernetes-Clusters-1.pdf","_links":{"self":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/media\/4465"}],"collection":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/comments?post=4465"}]}}