Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Preparing Your Incident Response Team for Container Incidents

The use of containers—and orchestration platforms like Kubernetes—is increasing rapidly around the globe. Analysts predict that by 2023, more than 70% of global organizations will be running more than two containerized applications ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Best of 2021 – 7 Principles of DevSecOps With Kubernetes

As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the eighteenth in our series of the Best of 2021. In ...
NetApp kubernetes Accurics security

Best of 2021 – How Not To Use Kubernetes: 5 Failure Stories

As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the fifteenth in our series of the Best of 2021. I ...
firewall hardening Aqua Security

Hardening Kubernetes Beyond NSA, CISA Guidance

Information security and data privacy in the cloud has an abysmal track record. Hardly a week goes by without some major cloud-powered security-related incident making the news. We, as a community, need ...
Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Misconfigured Argo Workflows Expose K8s to Attack

With the use of Kubernetes growing rapidly among enterprises comes increased opportunities for attackers to exploit the popular container orchestration platform’s weaknesses in security. This week, security specialist Intezer has detected a ...
Kubernetes Security Flaw

Insecure Defaults Remain a Threat for Kubernetes

Secure-by-default settings make it easier (and safer) to onboard cloud-native technologies. And, thankfully, most default security profiles and configurations are, often, quite solid. Take Istio, which is secure by default and built ...
compliance NSA Kubernetes stateful kubernetes k8s Kublr

K8s and Cloud Security: Compliance Just Ain’t Enough

Over just two years, breaches caused by cloud misconfigurations exposed 33.5 billion records and generated an estimated $5 trillion in damages. Amid rising cyberattacks and novel vulnerabilities, overlooking cloud and K8s security ...
serverless Calico

Tigera Cloudifies Calico to Secure, Monitor Kubernetes

Tigera today launched a software-as-a-service (SaaS) edition of a platform for monitoring and securing Kubernetes environments based on its open source Project Calico network virtualization software. Previously, the company made available an ...
Tigera zero-trust GitOps DevSecOps Kubernetes

Portshift Secures Kubernetes APIs

Portshift today unveiled an extension to its lineup of container security offerings to secure Kubernetes application programming interfaces (APIs). Zohar Kaufman, vice president of research and development for Portshift, says Extended Kubernetes ...
Tigera zero-trust GitOps DevSecOps Kubernetes

VMware Acquires Octarine to Advance Kubernetes Security

VMware this week announced its intent to acquire Octarine, a provider of a namesake cybersecurity framework based on a service mesh for Kubernetes clusters. The Octarine service mesh not only segments network ...