Topics

JFrog Report Surfaces Container Adoption Surge
JFrog this week published a report that suggests application environments are evolving as more organizations embrace containers and memory-safe programming languages like Rust to build and deploy applications. The report is based ...

Just-in-Time Permissions in Microservices-Based Applications
In a previous article, we discussed keeping microservices secure, even from themselves. But what else can you do to keep your application free of vulnerabilities that could be exploited by bad actors? ...

Mirantis to Integrate Shipa Acquisition With Lens IDE
This April, Mirantis will add automated application discovery, security and observability to its Lens Kubernetes Platform following its acquisition of Shipa. Shipa’s platform automatically creates all required Kubernetes objects and configuration files ...

Is Kubernetes Fit For Purpose?
Are Kubernetes clusters fit to run many of the applications being deployed on them? That question became the focal point of a panel discussion yesterday in Seattle, Washington, hosted by Tetrate, a ...

Using the Kubernetes Lens Dashboard to Boost Kubernetes Security
Kubernetes security is a complex challenge. Luckily, new open source tools are springing up to help address it. I’ll discuss a new, popular tool called Kubernetes Lens, which is making Kubernetes clusters ...

CNCF to Add Another Security Certification
At the CloudNative SecurityCon North America 2023 conference today, the Cloud Native Computing Foundation (CNCF) announced that it will release a Kubernetes and cloud security associate (KCSA) certification. The KCSA certification will ...

Red Hat OpenShift Update Extends Reach of Operators for Kubernetes
Red Hat today released updates to the Kubernetes-based Red Hat OpenShift platform, adding Operators to simplify security, compliance and networking. In addition, Red Hat is adding support for instances of Arm processors ...

Sysdig Report Surfaces Major Lack of Container Security
A new Sysdig report finds 87% of container images have high-risk vulnerabilities of which 15% make their way into runtime environments. The report also finds that 71% of those vulnerabilities have a ...

Tetrate Extends Scope and Reach of Istio Service Mesh
Tetrate’s Brooklyn update to its distribution of the open source Istio service mesh automates deployment of security policies. In addition, high availability has now been extended across clusters, regions and clouds running ...

Keep Microservices Secure, Even From Themselves
Cloud-native applications make heavy use of services and microservice architectures. Distributed applications provide many benefits to modern application development processes and lend themselves particularly well to applications deployed in the public cloud ...