Trend Micro

Trend Micro Publishes Guide to Kubernetes Security

Trend Micro has created a guide to Kubernetes threats that categorizes the threats into three broad categories: external attacks, misconfiguration issues and vulnerable applications. Mark Nunnikhoven, vice president of cloud research at ...
Portshift Kubernetes

Snyk Allies With Red Hat to Secure Containerized Apps

Snyk and Red Hat have aligned their efforts to make containerized applications deployed on Red Hat OpenShift, which is based on Kubernetes, more secure. Snyk Intel, a proprietary vulnerability feed that identifies ...
Kubermatic

Anchore Adds Windows Support to Kubernetes Security Platform

Anchore today announced it has added support for Windows container images to its platform for securing Kubernetes environments and made available a technology preview that adds the ability to analyze NuGet packages ...
ingress controller

Open Source Tern Locks Dockerfile to Container Image

The team behind the open source Tern tools for scanning container images has released an update that adds the ability to lock the base image of a Dockerfile to the packages installed ...
Aqua Security

Aqua Security Extends Container Security Platform

Aqua Security today launched a tool today that dynamically scans container environments to discover more sophisticated forms of malware that often elude static analysis tools. Rani Osnat, vice president of strategy for ...
StackRox NIST

StackRox Adds More Support for NIST Controls

StackRox this week announced it has added support for additional privacy and security controls defined by the National Institute of Standards and Technology (NIST) to the StackRox Kubernetes Security Platform. Branden Wood, ...
Portshift Kubernetes

Go Beyond Default Kubernetes Configs for Greater Security

Some organizations might be inclined to go with Kubernetes’ default configurations with the hope that these settings will provide a reasonable degree of security. But that wouldn’t be a good idea; on ...
Linode

NeuVector Adds Container Security, Compliance Tool

NeuVector today announced it has added a Vulnerability and Compliance Explorer tool to make it easier to prioritize remediation efforts to further advance the adoption of best DevSecOps processes. Glen Kosaka, vice ...
privileged container

Why Running a Privileged Container is Not a Good Idea

A privileged container has all the capabilities a host can perform. And that’s a bad idea. Containers are not, by any means, new. They have been consistently and increasingly adopted in the ...
Zerto

Alcide Advances DevSecOps in Kubernetes Environments

Alcide is moving to advance the adoption of best DevSecOps practices among developers of containerized applications running on Kubernetes platforms by making its container security platform available via a command-line interface (CLI) ...