incident Deepfence misconfigured Kubernetes security

Preparing Your Incident Response Team for Container Incidents

The use of containers—and orchestration platforms like Kubernetes—is increasing rapidly around the globe. Analysts predict that by 2023, more than 70% of global organizations will be running more than two containerized applications ...
NSA Guidance

NSA’s Kubernetes Hardening Guidelines and Pod Security

I previously asked (and answered) the question, What Are the NSA K8s Guidelines and Why Should You Care? I suggested that the first step to compliance is to understand your Kubernetes environment ...
containers security VMware Aqua security container security Kubernetes

Using Kubernetes to Secure Data

Data loss and ransomware are two of the biggest threats to data security today, especially as malicious actors turn their attention to the cloud. Even with security perimeters in place, bad actors ...
containers security VMware Aqua security container security Kubernetes

Securing Containers At Scale

While containers deliver speed and agility to software development and deployment, they also add a layer of complexity that invites unprecedented security concerns, including how to manage vulnerabilities in a dynamic container ...
zero-trust GitOps DevSecOps Kubernetes

Implementing Zero-Trust on Kubernetes

As a cornerstone of the cloud-native community, Kubernetes empowers enterprises to deploy and manage containers in production environments more efficiently. Although Kubernetes was initially designed with basic security capabilities, broad and rapid ...
endpoint Loft Labs OneSphere to Kubernetes on VMware

Endpoint Protection for Cloud-Native Workloads

Endpoint protection is the practice of deploying security systems on endpoints such as servers, workstations and mobile devices used to connect to corporate networks. The purpose of these systems is to detect, ...
Trend Micro cloud-native Oxeye Red Hat OpenShift

Oxeye Delivers CNAST Tool to Better Secure Microservices

At the KubeCon + CloudNativeCon Europe 2022 conference, Oxeye today announced general availability of its Cloud Native Application Security Testing (CNAST) tool to pinpoint vulnerabilities in microservices-based applications. The Oxeye platform requires ...
cloud-native Chronosphere cloud-native security Spectro

Survey Surfaces Cloud-Native Stress Points

A survey from Platform9, a managed Kubernetes service provider, finds that even as organizations embrace cloud-native technologies, concerns over security, management, high availability and observability remain. The survey, which polled more than ...
cloud-native Fugue security

Cloud-Native Security Posture Management

Lightspin CEO Vladi Sandler talks with Mike Vizard about how cloud security posture management (CSPM) is challenging in cloud-native computing environments. The video is below followed by a transcript of the conversation ...
Tigera container platform

Tigera Adds Scanning Engine to CNAPP for Kubernetes

Tigera today announced the addition of a scanning engine to its Calico Cloud service that will continuously assess images for vulnerabilities and misconfigurations in addition to managing interactions among microservices running on ...