key management container security CNCF security secure Kubernetes

Understanding Container Security – Part Two: Security Recommendations

In part one of this series, we discussed the rise in container security threats. As containers have gained in popularity, they’ve also provided an expanding attack surface. We explored why so many ...
Red Hat VMware Rafay Kubernetes Platform Closer to OpenStack

Red Hat Delivers on Open Source Security Promise for K8s

At the KubeCon + CloudNativeCon Europe 2022 conference, Red Hat this week made good on a promise to make Red Hat Advanced Cluster Security for Kubernetes available as an open source project ...
Kubernetes

New Year, More Kubernetes Vulnerabilities

Now that Kubernetes clusters are being deployed more widely in production environments, the level of attention being paid by cybersecurity researchers to a new platform in the enterprise will surely increase in ...
security risks

4 Security Risks Plaguing Container Development

Here are four of the most common security risks developers need to consider in their app development and deployments for containers and Kubernetes It is very risky for businesses to unveil an ...
microsegmentation

Sysdig Brings Native Microsegmentation to Kubernetes Clusters

Sysdig today at the online KubeCon + CloudNativeCon North America 2020 conference announced it has added zero-touch network security that leverages its core runtime security software to microsegment Kubernetes networks. Janet Matsuda, ...
kubernetes Accurics security

CyberArk Discloses Kubernetes Security Issues

CyberArk, a provider of privileged access management tools, published a report today detailing how weaknesses in the Container Network Interface (CNI) employed to connect Kubernetes Pods can be exploited by cybercriminals. Nir ...
Kata

Kata Container Security is Good, but There’s an Achilles Heel

In an age where security is paramount, addressing the vulnerabilities in Kata containers has never been more important. What does container security have to do with ancient Greek mythology? Quite a lot ...
Lacework zero-trust backup data recovery Red Hat Kubernetes security

What Will It Take to Shift Kubernetes Security Left?

Considering Kubernetes security must come earlier in the development journey Interest in Kubernetes has skyrocketed. A recent CNCF study found 84% of companies run containers in production, and 78% are using Kubernetes ...
access policy engines

Policy Engines: Ensuring Configuration Security in Kubernetes

Given their ease of use, flexibility and level of automation they deliver, policy engines have become a required component in Kubernetes clusters Kubernetes’ adoption in the enterprise has clearly grown beyond the ...
key management container security CNCF security secure Kubernetes

How to Secure Your Kubernetes Cluster

Here are some key steps for securing Kubernetes clusters Kubernetes is hot in the DevOps space and is now the third most wanted platform among developers. The appeal of the platform largely ...