phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Kubernetes Phishing: Preventing Social Engineering in Your K8s Environment

As Kubernetes becomes a mainstream platform for operating mission-critical applications, it is increasingly targeted by cybercriminals ...
Kubernetes team KubeMaster cloud-native

Scaling Your Kubernetes Team: In-House Vs. Freelance

When you need to scale your infrastructure and your Kubernetes team, should you build an in-house team or hire freelance professionals? ...
Kubernetes security FusionAuth secure container images

Kubernetes Security Best Practices for 2024

Here's what you should be focusing on in 2024 to keep your Kubernetes environments secure ...
Cilium containerized network Remote.It service mesh eBPF

Network Topology in Containerized Environments

Managing network topology in a containerized environment can be challenging, but with the right tools and practices, it's achievable ...
Amazon ECS cloud-native configuration eBPF

5 DevOps Use Cases for Amazon ECS

Amazon ECS is a scalable, secure container management service that makes it easy to manage Docker containers as a cluster ...
Dapr application security distributed cloud mobile apps

App Security Testing in Containerized Environments: Tips and Tricks

Development teams should prioritize application security testing, whether their applications are monoliths or containerized ...
SIEM attack Aqua Security CyberArk pen testing Accurics

SIEM for Containerized Environments

SIEM can help address some of the key security challenges of Docker, Kubernetes and related technologies ...
OpenTelemetry Argo NeuVector Extends Red Hat OpenShift Availability

OpenTelemetry for Containerized Environments

By providing a unified approach to telemetry data capture, OpenTelemetry aims to make observability more accessible to all developers ...
gitguardian Thycotic Kubernetes secrets

Best of 2023: kubectl get secret: Working With Secrets in Kubernetes

As we close out 2023, we at Cloud Native Now wanted to highlight the most popular articles of the year. Following is the latest in our series of the Best of 2023 ...
zero-trust services cloud-native permissions CNCF SOA vs. Microservices Monitoring

Best of 2023: Top 9 Microservices Design Patterns

There are several microservices design patterns, each with its unique characteristics and use cases. Here are nine to consider ...