Head of Cloud-Native Security | System Architect
+10 years of experience in IT security, expert in SELinux
The need of container security
The need of container security
In 2021, less than 40% of global organization ran containerized applications in production. 90% by 2027
Attackers are targeting the misconfiguration of cloud infrastructure (network, storage, identities and permissions), APIs and the software supply chain itself. Gartner 2023
K8s abstracts container networking, trading off the network security.
Traditional tools do not work with containerized environment. New tools and practices emerge every day.
The need of container security
In 2021, less than 40% of global organization ran containerized applications in production.
90% by 2027
Attackers are targeting the misconfiguration of cloud infrastructure (network, storage, identities and permissions), APIs and the software supply chain itself. Gartner 2023
K8s abstracts container networking, trading off the network security.
Traditional tools do not work with containerized environment. New tools and practices emerge every day.
Cost of dynamic approach
Cost of dynamic approach
The make it model
The make it model
Instantiated from
Every journey is a unique challenge, but our know-how:
Executed countless projects in the field to prominent entities in Europe, US, and Africa.
For various industries
Customer retention rate
Dedicated sircles specialized in given fields and technologies
Highest certification in various fields and “Training Partner” to some vendors
Expert PM with technical background ensuring project’s objectives are met
Instantiated from
Every journey is a unique challenge, but our know-how:
Executed countless projects in the field to prominent entities in Europe, US, and Africa.
For various industries
Customer retention rate
Dedicated sircles specialized in given fields and technologies
Highest certification in various fields and “Training Partner” to some vendors
Expert PM with technical background ensuring project’s objectives are met
Head of Cloud-Native Security | System Architect
+10 years of experience in IT security, expert in SELinux
Security Consultant | Software Architect
+10 years of experience in both application and infrastructure design
Reverse Engineer | Incident Responder | Opensource Developer and Contributor
CTF player, trainer, regular speaker at DEFCON, Insomni’hack, Nullcon
Areas and fields of focus
Areas and field of focus
Delivered by: SORINTians
Introducing a New Tool and Integration
Result & delivery (UTD)
Delivered by: SORINTians
Introducing a New Tool and Integration
Result & delivery (UTD)
Welisten
24x7x365
Welisten
24x7x365