GitOps

Backup and DR in the Age of GitOps

Whether you call it GitOps, infrastructure as code (IaC) or simply using a CI/CD pipeline to automatically deploy changes to an application, we can all agree that moving to a model where ...
Kata Container

Palo Alto Networks Discloses Kata Container Flaws

At the online Black Hat USA 2020 conference today, researchers from the Unit 42 arm of Palo Alto Networks disclosed how they had enabled malicious code to escape from a Kata Container ...
Threat Stack

Threat Stack Adds Support for AWS Fargate

Threat Stack announced today it has added support for the AWS Fargate managed serverless container service from Amazon Web Services (AWS) to its intrusion detection platform. Chris Ford, vice president of product ...
Kubernetes vulnerability

Common Container and Kubernetes Vulnerabilities

As Kubernetes gains more prominence, concern is mounting over how we gauge its effectiveness and mitigate container security vulnerabilities. Such vulnerabilities could leave a cluster unsecured or a container compromised, open to ...
Kubernetes security

Palo Alto Networks Digs Into Kubernetes Security Flaw

The Unit 42 research arm of Palo Alto Networks this week issued a security alert that warns a previously disclosed Kubernetes vulnerability may be more severe than initially appreciated. An issue known ...
container security

Forrester Highlights Rising Container Security Issues

In the wake of an earlier survey that revealed one-third of developers in enterprise IT organizations have now adopted containers, Forrester Research is now making available a report that defines a set ...
Sysdig DevOps

Sysdig Streamlines DevOps Kubernetes Platform

Sysdig today announced it has reduced the amount of time to set up the Sysdig Secure DevOps Platform for Kubernetes environments to less than five minutes. In addition, Sysdig is now making ...
container security

Prevasio Previews Container Security Service

Prevasio is providing early access to a namesake container security service that intercepts and inspects all network traffic generated by containers, including HTTPS traffic, and then applies machine learning algorithms to surface ...
container security

Container Security Best Practices Taking Shape

Almost 20 years after containers’ inception, container security is becoming top of mind. Here are some things to consider Now that containers are enjoying a notable spike in popularity, it can be ...
Carbonetes

Carbonetes Unfurls Container Security Service

Carbonetes today emerged from stealth mode to formally launch a namesake container application security testing service. Company CEO Mike Hogan says rather than requiring IT teams to acquire and integrate disparate container ...