Threat Mapping for Windows Containers
In the last few posts, we described how to install the Deepfence community edition i.e., ThreatMapper, and use it for run-time threat mapping for containers and hosts. In this article, we will use ThreatMapper to scan Windows container images hosted
By: Shyam Krishnaswamy |Use Case| Posted On:
July 23, 2020