Topics
Using Machine Learning and Kubernetes Logs to Automate Security Threat Detection
The audit log is a rich source of information on activity within your Kubernetes environment and a valuable tool for detecting threats Kubernetes is quickly consolidating its place as the leading container ...
Kubernetes Deployment for Edge Computing
Unlike cloud computing, which often requires the use of thousands of remote physical servers to power up various processes, edge computing needs significantly fewer resources. This is because edge computing processes are ...
Is Kubernetes Really Ideal for Edge?
Things you have probably heard: Edge computing is the next big thing. Kubernetes is ideally suited for edge. That makes it sound as if edge computing platforms are all buttoned up. Hah! ...
IBM Advances DevSecOps in Cloud Service Based on Kubernetes
IBM this week added a Code Risk Analyzer feature to the IBM Cloud Continuous Delivery service that enables developers to analyze code in a Git repository within the context of a DevOps ...
CyberArk Discloses Kubernetes Security Issues
CyberArk, a provider of privileged access management tools, published a report today detailing how weaknesses in the Container Network Interface (CNI) employed to connect Kubernetes Pods can be exploited by cybercriminals. Nir ...
Extending the Envoy Proxy With WebAssembly
As the service mesh landscape continues to grow, its underlying technology stack is maturing as well. For example, service mesh advocates are introducing methods to extend Envoy, the open source proxy at ...
Qualys Secures Containers Using Lightweight Agent
Qualys today announced Container Runtime Security, a new approach to securing containers that makes use of functions to enable agent software that applies security policies to be embedded within a container. Sumedh ...
5 Best Practices for Ensuring Secure Container Images
Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will be in production. For containerized workloads, securing the container image throughout the ...
Kata Container Security is Good, but There’s an Achilles Heel
In an age where security is paramount, addressing the vulnerabilities in Kata containers has never been more important. What does container security have to do with ancient Greek mythology? Quite a lot ...
Managed Cloud-Native Services on the Rise
A report published by Information Services Group (ISG) suggests the complexity of cloud-native technologies such as Kubernetes and emerging service mesh platforms is driving more organizations toward consuming managed services delivered via ...