Thomas Fellinger's articles
Threat detection in cloud native environments (part 2): How to automate threat management using workflows
Threat detection in cloud native environments: Detecting suspicious Kubernetes service account behavior