Whether it's an unsecured Kubernetes configuration or the Meltdown/Spectre exploits, there is always a way into your company's seemingly secure container infrastructure. We'll take a tour of the most surprising container exploits - and how to use tools like SSL and VPNs to create a strong defense for your own environment.