cloud-native vulnerabilities Harbor registry

Overcoming Container Security Gaps With Active Vulnerability Management

Organizations can reduce security risks in containerized applications by actively managing vulnerabilities through scanning, automated image deployment, tracking runtime risk and deploying mitigating controls. Kubernetes and containers have become de facto standards ...
Kubernetes IBM Aligns With Twistlock on Container Security

Why You Shouldn’t Use a Jump Server to Protect Kubernetes’ API

Kubernetes has become the de facto standard in running and managing workloads. A Kubernetes cluster comprises multiple resources (such as machines, CPUs, memory, storage, etc.) and software components with multiple purposes. The ...
firewall hardening Aqua Security

Container Firewalls: What Are the Options?

Container firewalls are security tools that protect containerized applications and the host environment they run on from malicious traffic and threats.  Containers are a lightweight and portable way to package and deploy ...
Chainguard cloud-native Tigera Kubernetes supply chain

Cloud-Native Applications are Like Nuclear Submarines

Have you seen the movie Crimson Tide? Every person architecting a cloud-native application should see this movie. In it, a breakaway Russian government threatens a nuclear attack on the United States. A ...
zones IBM Extends Kubernetes Across Cloud

Building Cloud-Native Applications Using Isolation Zones

Cloud-native architectures are perfect for creating and operating modern, innovative applications. Cloud-native applications provide many advantages both to consumers of the applications and to those building and managing them. But bad actors ...
Kubernetes TrapX container security

Best of 2022: 4 Best Practices for Kubernetes Reliability

As we close out 2022, we at Container Journal wanted to highlight the most popular articles of the year. Following is the latest in our series of the Best of 2022. One ...
Helm D2iQ assessment gap steer kubernetes 1.27

10 Cloud-Native Predictions for 2023

2022 was a big year for cloud-native technology, especially for Kubernetes. The open source container orchestration platform saw a tremendous surge in adoption. Developer experience with Kubernetes steadily improved to the point ...
Tigera zero-trust GitOps DevSecOps Kubernetes

Tigera Makes Implementing Zero-Trust for Kubernetes Easier

Tigera announced today it is making it simpler to implement zero-trust policies at the namespace level across multiple Kubernetes clusters. Kubernetes clusters make it possible to implement security policies at the pod ...
user AWS Trend Micro cloud-native Oxeye Red Hat OpenShift

AWS Strengthens Container Security in the Cloud

Amazon Web Services (AWS) has extended the reach of the Amazon GuardDuty security monitoring service to include threat detection for the runtime environments in which containers are deployed. In addition, AWS Nitro ...
Civo Kubernetes Java

Datadog Report Surfaces Kubernetes Management Challenges

Datadog’s analysis of 1.5 billion containers run by its customers finds that the most widely employed instance of Kubernetes is version 1.21 which officially reached end-of-life earlier this year. The report suggests ...