Sysdig's Falco Container Security Runtime

Sysdig Adds Ability to Make Container Runtimes Immutable

Sysdig today added a Drift Control capability to its container security platform that makes it possible to lock down runtime environments. Daniella Pontes, senior manager for product marketing at Sysdig, says IT ...
Slim.AI Docker OpsRamp Extends AIOps Reach to Kubernetes

Slim.AI Integrates Container Automation Platform With DevOps Workflows

Slim.AI, via an early access program, has made available a version of its automated container security remediation platform that can now be more easily integrated within a DevOps workflow. John Amaral, Slim.AI ...
Kubernetes backup and recovery

Tips For Stateful Kubernetes Data Backup And Recovery

All systems need a plan for data backup and recovery. It doesn’t matter if your application’s running on the cloud, on-premises or in a refrigerator at the edge of a network—it will ...
key management container security CNCF security secure Kubernetes

4 CNCF Projects For Key Management

The nuances of cloud-native architecture necessitate some new approaches to security. Not only are container-based microservices inherently distributed, but there is a rising number of dependencies within the software supply chain. As ...
security IaC containers secure

Container Threats in the Cloud: What Enterprises Need to Know

With the changing cybersecurity landscape, enterprises need to incorporate stringent security mechanisms to protect their in-house infrastructure and cloud-native applications—those built using microservices; that are container-based and running on platforms such as ...
Lacework Red Hat Aqua Security

The State of K8s Software Supply Chain Attacks

Securing the software supply chain is in the zeitgeist, and for a good reason. Software supply chain attacks grew by more than 300% from 2020 to 2021. Supply chain attacks continue to ...
endpoint Loft Labs OneSphere to Kubernetes on VMware

Endpoint Protection for Cloud-Native Workloads

Endpoint protection is the practice of deploying security systems on endpoints such as servers, workstations and mobile devices used to connect to corporate networks. The purpose of these systems is to detect, ...
Kubernetes auth spot node check

Auth In the Age of Kubernetes

Kubernetes! It seems like the whole world is excited about this new software deployment platform. And why not? From the docs, we know that “Kubernetes is a portable, extensible, open source platform ...
key management container security CNCF security secure Kubernetes

Understanding Container Security – Part Two: Security Recommendations

In part one of this series, we discussed the rise in container security threats. As containers have gained in popularity, they’ve also provided an expanding attack surface. We explored why so many ...
container security

Understanding Container Security – Part One: Security Gaps

In our recent interview with Aqua Security’s Rory McCune about CRI-O vulnerability CVE-2022-0811, he mentioned that he’d seen a sharp rise in container cybersecurity threats this year. His experience isn’t unusual; last ...