Use case — Runtime Threat Mapping for AKS using Deepfence ThreatMapper
Last month we had described how to install Deepfence community edition i.e. ThreatMapper on AWS ECS, and use it for vulnerability scanning of hosts and containers. Last week, we also removed all node and usage restrictions from Deepfence ThreatMapper; now you can visualize and
By: Shyam Krishnaswamy |Use Case| Posted On:
July 6, 2020