container security
5 Kubernetes Pain Points and How to Solve Them
Kubernetes is an open source orchestration platform for managing Linux containers in private, public and hybrid cloud environments. It is also commonly used to manage a microservices architecture. Containers and Kubernetes can ...
Kubernetes Security in Your CI/CD Pipeline
Kubernetes security involves implementing security measures and tools and adopting best practices for protecting Kubernetes workloads. Kubernetes is an open source container management platform across public, private and hybrid clouds. Organizations employ ...
5 Laws of Cloud-Native Authorization
In a microservices world, each service needs to verify that a subject (user or machine) has permission to perform an operation on a resource that the service manages. But in an agile ...
Vulnerability Management: Context From Code to Cloud
Almost all modern cloud-native applications are developed using open source components. And yet, security is not always the top priority for open source developers. While many vulnerabilities can be accidental (e.g., coding ...
Understanding Role-Based Access Control in Kubernetes
“I’m sorry Dave, I’m afraid I can’t do that.” – HAL 9000, 2001: A Space Odyssey This iconic quote from 2001: A Space Odyssey is a great place to start if you ...
Container Images: The Next Software Supply Chain Concern?
Containers not only provide a mechanism for packaging code in deployable and manageable units, but containers are also a downloadable resource that can speed up infrastructure and app configurations, rapidly creating development ...
Veracode Adds Container Support to Security Tool for Developers
Veracode is launching an early access program through which it is adding support for containers to its Continuous Software Security Platform. Brian Roche, chief product officer for Veracode, says this offering will ...
Sysdig Report Reveals True Cost of Container Security Breaches
A Sysdig report published today finds that for every dollar cybercriminals generate through a cryptomining attack against a cloud container environment, victims end up paying a $53 bill. As a result, an ...
NSA Security Best Practices for Kubernetes
In this series, I’ve outlined why every organization should care about the NSA’s Kubernetes Hardening Guidelines and examined different areas of the guidelines. What you may suspect is that most of the ...
Sysdig Simplifies Container Security Remediation
Sysdig today announced it is adding a guided remediation tool along with a checklist to help organizations better prioritize their container remediation efforts. Alba Ferri, senior manager for product marketing at Sysdig, ...