NSA Guidance

NSA Security Best Practices for Kubernetes

In this series, I’ve outlined why every organization should care about the NSA’s Kubernetes Hardening Guidelines and examined different areas of the guidelines. What you may suspect is that most of the ...
container security sysdig snyk container Mirantis Aqua Security GitHub

5 Tricky Container Security Challenges

Containerized environments can be relatively complex to secure, particularly for enterprise teams used to more traditional network security processes and strategies. There was initial optimism that containerized infrastructure would actually be more ...
CloudCasa Sysdig containers CommVault

Containers in the Cloud Next on Cybercriminals’ Radar

Over the past couple of years, containers have solved many complex issues related to the compatibility and portability of deployments. But that means they contain sensitive information that can attract the attention ...
containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

Zero-Trust for Kubernetes

Zero-trust is a new security paradigm that is adopted by the world’s biggest and most technically advanced organizations, including Google, Microsoft, and Amazon Web Services (AWS). It is being applied to virtually ...
container security

Why Kubernetes Service Ownership is the Answer to Container Security

Full-service ownership is a hot topic right now in Kubernetes, as it revolves around the need for better container security. At the center of the discussion is the question of how this ...
DevSecOps SRE Kubernetes

DevSecOps Essentials for Containers

DevSecOps has emerged as the preferred and necessary approach to secure modern applications by ensuring security practices are seamlessly integrated into the software development and delivery process in an automated fashion. While ...
GitOps policy-as-code security KubeCon TriggerMesh serverless computing

3 Reasons Teams Struggle to Shift Security Left

It seems like you can’t talk about application security today without mentioning “shifting left.” This phrase refers to bringing security into the ‘left’ side of the software development life cycle and testing ...
Datadog sidecar VMware Kubernetes containers container

Survey Sees Spike in Container Adoption on Kubernetes Platforms

A survey of 156 attendees at the recent virtual KubeCon North America 2020 conference suggests the rate at which containers are deployed on Kubernetes clusters is accelerating. The survey, conducted last November ...
Kubernetes TrapX container security

10 Questions To Assess Your Container and Kubernetes Security

Kubernetes adoption has exploded, especially in production environments, and is considered by most as the de facto container orchestrator. As the container and Kubernetes market continues to mature, security of the cloud-native ...