Making Percona Kubernetes Operators More Secure With Trivy
Just to have a simple refresher, let’s start with a bit of Wikipedia: a vulnerability (in computing) is: Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be exploited by a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a […]