
The Secret to Securing Kubernetes
SPONSORED
John has served the realm as a lord security developer, product manager and open source community manager for more than 15 years, working on cybersecurity products such as Conjur, LDAP, Firewall, JAVA Cyptography, SSH and PrivX. He has a wife, two kids and a small patch of land in the greater Boston area, which makes him ineligible to take the black and join the “Knight’s Watch,” but he’s still an experienced cybersecurity professional and developer.