SoloCon Gloo GraphQL

Aqua Security Report Reveals Container Attack Blast Radius

An analysis of 105 victims of malicious container images published today by Aqua Security today finds just over a third (36%) of hosts had multiple severe vulnerabilities and misconfigurations that could be ...
Kubernetes

Understanding Kubernetes Compliance and Security Frameworks

There’s a reason why Kubernetes (K8s) has become the world’s leading container orchestration platform, with 74% of today’s IT companies using it for containerized workloads in production. It’s often the simplest way ...
access policy engines

Role-Based Access Control with Cloud Foundry in Kubernetes

In modern software development infrastructure, role-based access control (RBAC) is a hierarchical approach to security. It is basically a security design that restricts access to sensitive resources based on the role that ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

6 Cloud-Native Tools For Security and Compliance

The Cloud Native Computing Foundation (CNCF) continues to lead the industry in supporting new cloud-native technologies. The innovative packages hosted by CNCF have seen impressive adoption rates among software teams of all ...
Foundry cloud-native Cloudian storage Kubernetes

A Holistic Approach to Cloud-Native Security and Observability

Like any great technology, the interest in and adoption of Kubernetes (an excellent way to orchestrate your workloads, by the way) took off as cloud-native and containerization grew in popularity. With that ...
Komodor NeuVector Portworx Kubernetes

NeuVector Adds K8s Assessment Tool to Container Security Platform

NeuVector today announced it has added a configuration posture management and deployment assessment tool for Kubernetes resources to its namesake container security platform. Glen Kosaka, vice president of product management for NeuVector, ...
Fugue Code Analysis Finds Kubernetes

Fugue Extends IaC Security Reach to Cloud-Native Runtimes

Fugue today announced it has extended the reach of its platform for securing infrastructure-as-code (IaC) used to deploy cloud-native applications to now include runtime environments. Company CEO Josh Stella says DevOps teams ...
firewall hardening Aqua Security

Hardening Kubernetes Beyond NSA, CISA Guidance

Information security and data privacy in the cloud has an abysmal track record. Hardly a week goes by without some major cloud-powered security-related incident making the news. We, as a community, need ...
container how Containers

Why is Standardizing on Container Best Practices so Hard?

If you are the technology leader of your organization, you are likely driving the shift to cloud-native or even multi-cloud architectures to capitalize on the scalability, elasticity and agility it offers. And ...
Veeam backup and recovery

Prioritizing Backup as Container Use Rises

According to a recent report from Evaluator Group, the Spring 2021 Hybrid Cloud Study, 29% of enterprises are using Kubernetes in a production environment today with another 40% testing Kubernetes with plans ...