Ultimate Guide to Container Security

The Ultimate Guide to Container Security

How do you keep containers secure? That’s a big question, especially given how many distinct components you have to secure in a containerized environment. But it’s a question that has clear answers ...

Aqua Security, Amazon Web Services and Red Hat to Co-Host First-Ever KubeSec Enterprise Summit

JP Morgan Chase, Starbucks, Tinder and Forrester are among the presenters who will examine best practices and emerging trends in Kubernetes security technologies SEATTLE – December 10, 2018 –Aqua Security, Amazon Web ...
Kubernetes Security Flaw

Kubernetes Security Flaw Raises IT Operations Concerns

A recently identified security flaw in Kubernetes container orchestration software is adding fuel to a simmering debate over how the Kubernetes update process should be managed. The security flaw involves a privilege ...
HIPAA Compliance in a Containerized Environment

Best Practices for HIPAA Compliance in a Containerized Environment

The HIPAA compliance framework is somewhat infamous for setting high-level requirements regarding healthcare data and privacy without recommending specific ways of meeting those requirements. That tendency leaves many developers, admins and DevOps ...
Survey: Container Security Concerns Rise

Survey: Container Security Concerns Rise

Now that containers are starting to proliferate across the enterprise, there is a greater appreciation for the associated cybersecurity implications. A survey of 230 IT and security executives conducted by CyberEdge Group ...
Audit Docker Container Security

Methods to Audit Docker Container Security

Container adoption is off the charts. With more enterprises passing valuable data through these containers, security has become a chief priority for maintaining stability and for meeting new international data regulations such ...
Automation in Microservices Security

Why Automation is the Crucial Ingredient in Microservices Security

Microservices security is different from securing other technologies—and much more difficult Microservices are nothing new. Neither is the conversation about best practices for securing microservices. Typically, that conversation centers on strategies such ...

Tripwire for DevOps Now Offers Security Configuration Assessment of Containers

Tripwire’s DevOps SaaS provides visibility into configurations in addition to vulnerabilities in containers across DevOps lifecycle PORTLAND, Ore. – October 23, 2018 – Tripwire, Inc., a leading global provider of security and compliance solutions ...
Alert Logic Extends Reach of IDS

Container Security: Alert Logic Extends Reach of IDS for Containers

As container security becomes a higher priority, more organizations are starting to pay attention to not just segmentation of services using, for example, firewalls, but also security fundamentals such as intrusion detection ...

Alert Logic Extends Security to Cover Any Container Across Multiple Platforms

Industry’s Only Network IDS for Containers Adds Log Management and Expands Coverage Beyond AWS to Azure, On-Premises and Hosted Environments HOUSTON – October 9, 2018 – Alert Logic, the leading provider of Security-as-a-Service solutions, today announced major updates ...
Loading...