Jump to content

Ian Coldwater

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Angogaru (talk | contribs) at 21:19, 2 July 2022 (Links were invalid and not legitimate.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Ian Coldwater
Coldwater, wearing a black parka and beanie hat
Ian Coldwater
Occupation(s)Computer security specialist and speaker
EmployerTwilio
Organization(s)Kubernetes SIG Security, Open Source Security Foundation
Securing: Kubernetes SIG Security is Here!|date=May 14, 2021|last=Coldwater|first=Ian|type=Video|publisher=Cloud Native Computing Foundation|time=0:10|last2=Sable|first2=Tabitha|last3=Raghunathan|first3=Savitha|last4=Small|first4=Aaron}}</ref>[1]

Career

Coldwater started working in tech in their thirties, originally starting in DevOps before focusing on security.[2] They began specializing in hacking and hardening Kubernetes containers, working as an independent penetration tester before joining Heroku as a lead platform security engineer.[2][3] As of 2021, they work as a security architect at Twilio.[4] Along with Tabitha Sable, they co-chair the Kubernetes special interest group, Kubernetes SIG Security.[5][6] They are also on the governing board of the Open Source Security Foundation.[7]

Coldwater has spoken at conferences including DEF CON,[8] Black Hat,[9] KubeCon and CloudNativeCon,[1] RSA Conference,[10] Velocity,[11] and devopsdays.[12][13] In 2020, they received the Top Ambassador award from the Cloud Native Computing Foundation for spreading interest in the area.[13]

Hacking Kubernetes, published by O'Reilly Media, credits Coldwater and Duffie Cooley for co-developing the "canonical offensive Kubernetes one-liner".[14] In 2020, Coldwater and Brad Geesaman presented a talk at RSA 2020 titled Advanced Persistence Threats – The Future of Kubernetes Attacks,[15] in which they demonstrated bypassing Kubernetes audit logs and other attacks.[14] In 2021, Coldwater, with expertise from Chad Rikansrud, became the first person in history to escape a container on a mainframe.[8][16]

Personal life

Coldwater lives in Minneapolis, Minnesota.[10]

See also

References

  1. ^ a b "Ian Coldwater". KubeCon + CloudNativeCon Europe 2020. 2020. Retrieved July 23, 2021.{{cite web}}: CS1 maint: url-status (link)
  2. ^ a b Coldwater, Ian (August 6, 2019). "Attacking and Defending Kubernetes, with Ian Coldwater". Kubernetes Podcast (Interview). Interviewed by Adam Glick; Craig Box. Google. Retrieved July 23, 2021.
  3. ^ Combs, Veronica (May 1, 2021). "5 weird, cool things I learned from attending Deserted Island DevOps on Animal Crossing". TechRepublic. Retrieved July 10, 2021.
  4. ^ Lima, Cristiano (September 16, 2021). "Why Democrats are rallying around creating a new FTC privacy bureau to police Big Tech". The Washington Post. Retrieved May 17, 2022.
  5. ^ Cite error: The named reference :0 was invoked but never defined (see the help page).
  6. ^ Cite error: The named reference :1 was invoked but never defined (see the help page).
  7. ^ "Governing Board". Open Source Security Foundation. Retrieved July 23, 2021.{{cite web}}: CS1 maint: url-status (link)
  8. ^ a b "DEFCON29 Speakers". DEF CON. 2021. Retrieved August 5, 2021.{{cite web}}: CS1 maint: url-status (link)
  9. ^ "Speaker: Ian Coldwater". Black Hat Briefings. Retrieved July 23, 2021.{{cite web}}: CS1 maint: url-status (link)
  10. ^ a b "Ian Coldwater". RSA Conference. Retrieved July 23, 2021.{{cite web}}: CS1 maint: url-status (link)
  11. ^ "Speaker: Ian Coldwater". O'Reilly Velocity Conference. 2019. Retrieved July 23, 2021.{{cite web}}: CS1 maint: url-status (link)
  12. ^ "Ian Coldwater". devopsdays. Retrieved July 23, 2021.{{cite web}}: CS1 maint: url-status (link)
  13. ^ a b Cloud Native Computing Foundation (November 20, 2020). "Cloud Native Computing Foundation Announces 2020 Community Awards Winners". Retrieved July 10, 2021.
  14. ^ a b Martin, Andrew; Hausenblas, Michael (2021). Hacking Kubernetes : threat-driven analysis and defense (First ed.). Sebastapol, CA: O'Reilly Media. ISBN 978-1-4920-8170-8. OCLC 1276934473.{{cite book}}: CS1 maint: date and year (link)
  15. ^ Geesaman, Brad (March 2, 2020). "Advanced Persistence Threats - The Future of Kubernetes Attacks". Darkbit. Retrieved May 17, 2022.
  16. ^ "Container Breakout: Cybersecurity Lessons Learned". SHARE. Retrieved January 24, 2022.
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy