The automated capabilities can discover misconfigurations, compliance violations, and risk or excessive privileges in Kubernetes clusters. Please leave this field empty Oh hi there 👋It’s nice to meet you. Sign up to receive awesome content in your inbox, every month. We don’t spam! Read our privacy policy for more info. Check your inbox or spam folder to confirm your subscription. Please leave this field empty Oh hi there 👋It’s nice to meet you. Sign up to receive awesome content in your inbox, every month. We don’t spam! Read our privacy policy for more info. Check your inbox or spam folder to confirm your subscription. Post navigation Star Wars Galactic Starcruiser, Year One: Things We Liked and Things That Can ImproveBalancing Fan Expectations in The Mandalorian