API Open service brokers

As API Threats Multiply, Cybersecurity Lags

Things are heating up for APIs. API-based startups are catching the eye of investors. Forbes recently called the API economy the “next big thing.” But as they multiply, so do security threats ...
Kubernetes threats

Addressing Kubernetes Data Protection Challenges

While containers have been around since the 1970s, their popularity exploded with the advent of Docker in 2013. Now, container orchestration tools like Kubernetes are rapidly transforming how applications are developed and ...
Kubernetes

Kubernetes Security: Attachment Issues

As a product manager, my main focus is on the value my customers will get from products. I often meet with customers and talk about pain points and problems; offer a solution, ...
Rapid7 container security

Rapid7 Acquires Alcide in Bid to Unify Security

Rapid7 this week announced it has acquired Alcide, a provider of a platform for securing Kubernetes, for $50 million as part of an effort to unify cybersecurity across multiple platforms. Brian Johnson, ...
Kubernetes backup and recovery

How to Implement Disaster Recovery for Kubernetes

Conventional wisdom used to be that a disaster recovery plan (DRP) applied only to services and/or platforms that your organization personally managed and/or operated. But, with the rise of anything-as-a-service (XaaS), many ...
Fugue security

Fugue Cloud Security Adds Support for Container Runtimes

Fugue today announced it has extended its eponymous platform for securing cloud environments to include container runtime environments. Josh Stella, Fugue’s CEO, says it’s more cost effective for organizations to employ a ...
container

Sysdig Report Surfaces Shifts in Container Adoption

An annual “Container Usage and Security Report” published today by Sysdig finds there has been a significant shift in terms of the types of container engines organizations are employing. Based on an ...
vulnerability

Kubernetes MiTM Vulnerability Underscores Need for Virtual Patching

CVE-2020-8554, a man-in-the-middle (MiTM) vulnerability affecting all Kubernetes versions, has begun drawing attention from the cloud-native community for its ability to allow authenticated-but-malicious users to remotely bypass security restrictions. This vulnerability is ...
DevOps teams

DevOps Teams: Automate Container Security to Protect CI/CD Pipelines

Automation can help lead DevOps teams to the true path to having optimum container security DevOps is one of the most efficient ways of developing apps and programs, as it allows for ...
container vulnerabilities

Report: Docker Hub Container Vulnerabilities High

Prevasio, a provider of a cloud service for scanning container images, this week released a report based on a scan of 4 million public container images found in Docker Hub that concludes ...