security
SIEM for Containerized Environments
SIEM can help address some of the key security challenges of Docker, Kubernetes and related technologies ...
Overcoming Chaos in Kubernetes Certificate Management
Kubernetes requires a sophisticated approach to certificate management that must span a vast array of configurations and dependencies ...
ARMO Brings VEX to Kubernetes Security Posture Management Platform
ARMO added support for VEX to Kubescape, an open source security posture management project for Kubernetes ...
Kubernetes: The Silent Hero of Our Daily Digital Dependence
What most people don't realize is that Kubernetes is the backbone of the digital services and apps we rely on every day ...
5 Surprising Uses for Docker Debug
Beyond troubleshooting, the Debug command can help improve the performance and resource utilization of Docker containers ...
AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp
As teams leverage infrastructure-as-code (IaC) at scale on AWS, ops and platform teams are tasked with implementing provisioning standards to prevent security breaches, non-compliance or provisioning practices that drive cloud waste. With ...
Cloud-Native AI Workloads: Scalability, Sustainability and Security
Confidential computing, special instructions and hardware, in combination with projects such as KEDA and Kepler, can provide scalability, sustainability and security ...
How Cloud-Native Zero-Trust Could Up its Game With Permissions
The cloud-native world could learn a thing or two from the simplicity of mobile application permissions ...
How Kubernetes Adoption Fosters Cloud Resiliency
In the last few years, we’ve seen Kubernetes become businesses’ default container orchestration tool, and it’s easy to understand why. With IT teams’ reliance on containers growing as they increasingly prioritize agile ...
Building Secure Multi-Tenant Container Platforms
Building and securing a multi-tenant container platform requires an advanced multi-tenancy architecture to ensure every aspect can be managed effectively. The platform should perform a wide range of functions, from creating secure, ...