container security

As API Threats Multiply, Cybersecurity Lags
Things are heating up for APIs. API-based startups are catching the eye of investors. Forbes recently called the API economy the “next big thing.” But as they multiply, so do security threats ...

Addressing Kubernetes Data Protection Challenges
While containers have been around since the 1970s, their popularity exploded with the advent of Docker in 2013. Now, container orchestration tools like Kubernetes are rapidly transforming how applications are developed and ...

Kubernetes Security: Attachment Issues
As a product manager, my main focus is on the value my customers will get from products. I often meet with customers and talk about pain points and problems; offer a solution, ...

Rapid7 Acquires Alcide in Bid to Unify Security
Rapid7 this week announced it has acquired Alcide, a provider of a platform for securing Kubernetes, for $50 million as part of an effort to unify cybersecurity across multiple platforms. Brian Johnson, ...

How to Implement Disaster Recovery for Kubernetes
Conventional wisdom used to be that a disaster recovery plan (DRP) applied only to services and/or platforms that your organization personally managed and/or operated. But, with the rise of anything-as-a-service (XaaS), many ...

Fugue Cloud Security Adds Support for Container Runtimes
Fugue today announced it has extended its eponymous platform for securing cloud environments to include container runtime environments. Josh Stella, Fugue’s CEO, says it’s more cost effective for organizations to employ a ...

Sysdig Report Surfaces Shifts in Container Adoption
An annual “Container Usage and Security Report” published today by Sysdig finds there has been a significant shift in terms of the types of container engines organizations are employing. Based on an ...

Kubernetes MiTM Vulnerability Underscores Need for Virtual Patching
CVE-2020-8554, a man-in-the-middle (MiTM) vulnerability affecting all Kubernetes versions, has begun drawing attention from the cloud-native community for its ability to allow authenticated-but-malicious users to remotely bypass security restrictions. This vulnerability is ...

DevOps Teams: Automate Container Security to Protect CI/CD Pipelines
Automation can help lead DevOps teams to the true path to having optimum container security DevOps is one of the most efficient ways of developing apps and programs, as it allows for ...

Report: Docker Hub Container Vulnerabilities High
Prevasio, a provider of a cloud service for scanning container images, this week released a report based on a scan of 4 million public container images found in Docker Hub that concludes ...