Container Security Requires a Holistic View

Effective Container Security Requires a Holistic View

This won’t come as a surprise, but technology is evolving quickly. The transition from physical servers to virtual servers, to virtual servers in the cloud, to DevOps tools and practices, to microservices ...
Crypto Anchors Thwart Container Security Breaches

Using Crypto Anchors to Thwart Container Security Breaches

With new cyberattacks occurring week by week, security is now an extremely critical focus for all engineering teams. It’s also influencing the creation of new ways to prevent attacks. Crypto anchors, one ...
Top 9 Kubernetes Settings

Best of 2018: Top 9 Kubernetes Settings You Should Check to Optimize Security

As we close out 2018, we at Container Journal wanted to highlight the five most popular articles of the year. Following is the fourth in our weeklong series of the Best of ...
Ultimate Guide to Container Security

The Ultimate Guide to Container Security

How do you keep containers secure? That’s a big question, especially given how many distinct components you have to secure in a containerized environment. But it’s a question that has clear answers ...
Kubernetes Security Flaw

Kubernetes Security Flaw Raises IT Operations Concerns

A recently identified security flaw in Kubernetes container orchestration software is adding fuel to a simmering debate over how the Kubernetes update process should be managed. The security flaw involves a privilege ...
HIPAA Compliance in a Containerized Environment

Best Practices for HIPAA Compliance in a Containerized Environment

The HIPAA compliance framework is somewhat infamous for setting high-level requirements regarding healthcare data and privacy without recommending specific ways of meeting those requirements. That tendency leaves many developers, admins and DevOps ...
Survey: Container Security Concerns Rise

Survey: Container Security Concerns Rise

Now that containers are starting to proliferate across the enterprise, there is a greater appreciation for the associated cybersecurity implications. A survey of 230 IT and security executives conducted by CyberEdge Group ...
Audit Docker Container Security

Methods to Audit Docker Container Security

Container adoption is off the charts. With more enterprises passing valuable data through these containers, security has become a chief priority for maintaining stability and for meeting new international data regulations such ...
Aqua Security Extends Container Security Platform

Aqua Security Extends Container Security Platform

Aqua Security today announced it has natively extended the reach of its container security platform to include serverless computing frameworks. Version 3.5 of Aqua Container Security Platform (CSP) adds a risk assessment ...
Automation in Microservices Security

Why Automation is the Crucial Ingredient in Microservices Security

Microservices security is different from securing other technologies—and much more difficult Microservices are nothing new. Neither is the conversation about best practices for securing microservices. Typically, that conversation centers on strategies such ...