security IaC containers secure

The Last Cloud-Native Puzzle Piece: Security Automation

In recent years, DevOps has embraced automation in this new cloud-native world. Infrastructure-as-code (IaC) is now commonly applied to spin up servers, automate configurations, set up storage and apply standard networking features ...
kubernetes

ARMO Tool Determines Security Posture of Kubernetes Clusters

ARMO has made available a Kubescape tool for testing whether Kubernetes clusters have been deployed securely. The Kubescape tool uses guidance for hardening the platform provided by the National Security Agency (NSA) ...
Anchore Grype API NetApp Spot

Anchore Delivers Container Security Integration for GitLab

Anchore has made its open source Grype vulnerability scanner tool for containers generally available for DevOps teams that are running the latest version of the GitLab continuous integration/continuous delivery (CI/CD) platform. Anchore ...
unikernel Sumo Logic

The Time for Unikernels is Now

In this episode of The View With Vizard, NanoVM CEO Ian Eyberg explains why the time to employ unikernels to make IT more secure has arrived. The video is below, followed by ...
TrapX container security

TrapX Security Brings Deception Platform to Container Environments

TrapX Security this week announced that its deception platform for misdirecting attacks against IT environments can now be deployed in container environments. Steve Preston, TrapX CEO, says version 7.2 of TrapX DeceptionGrid ...

Cloud-Native Security

Click to read Cloud-Native Security ...
|
Cloud-Native Security Best Practices

Are We There Yet? The State of Cloud-Native Security

In this session from DevOps Connect: RSAC 2021, Matt Jarvis and Simon Maple from Snyk discuss new, insightful and surprising findings on cloud-native application security from a recent industry survey. Learn about ...
backup data recovery Red Hat Kubernetes security

5 Reasons to Back Up Kubernetes Applications

Software containers are at the heart of cloud-native business transformation initiatives, and they are a natural evolution from virtual machines to a more granular and portable application environment in clouds. Containers are ...
Threat Stack monolith microservices

Threat Stack Deepens Threat Discovery Reach for Amazon EKS

Threat Stack announced today it is extending its threat monitoring platform for the public cloud service from Amazon Web Services (AWS) to include the Amazon Elastic Kubernetes Service (Amazon EKS) on the ...
misconfigured Kubernetes security

Misconfigured Argo Workflows Expose K8s to Attack

With the use of Kubernetes growing rapidly among enterprises comes increased opportunities for attackers to exploit the popular container orchestration platform’s weaknesses in security. This week, security specialist Intezer has detected a ...