Survey Surfaces Raft of Cloud Native Application Security Challenges
Venafi, a unit of CyberArk, today published a survey of 800 security and IT decision-makers in the U.S. and Europe finds 86% of respondents work for organizations that have experienced a security ...
Container Adoption Comes with Risks for Software Supply Chain
Multiple critical vulnerabilities and risks have been found lurking within some of the most commonly downloaded Docker Hub container images. The NetRise study examined 70 randomly selected images from the top 250 ...
Unlocking Value, Minimizing Risk in the Kubernetes Ecosystem
The key to mastering Kubernetes is not just selecting the right add-ons — it is about taming the complexity of managing them at scale, while ensuring they align with your evolving business ...
The Kubernetes Annotation Pitfall: The One Word That Puts Your AWS Load Balancers at Risk
Misconfiguring just one word in Kubernetes can expose your AWS environment to the internet, putting your data and applications at serious risk ...
A Nose for a Node, PerfectScale Streamlines Kubernetes Optimization
PerfectScale's Kubernetes optimization and governance platform is aligned to serve platform engineering teams across DevOps environments with tools to improve the stability of what it calls a “complete K8s environment” in live ...
Pulumi Extends Ability to Manage Kubernetes Infrastructure
Pulumi today at the KubeCon + CloudNativeCon 2024 conference extended its support for Kubernetes environments to include an Operator that can now be hosted on its dedicated pod ...
Edera’s Big Container Security Question: Am I Isolated?
Company releases ‘Am I Isolated’, an open source container security benchmark and Rust-based container runtime scanner ...
Unlocking the Full Potential of Container Vulnerability Scans
Given the complex dependencies of container images, which can rely on other container images with potential vulnerabilities, it is crucial for developers to proactively identify and address container security vulnerabilities before deployment ...
Bad Actors Exploiting Docker Remote API Servers in Attacks
Researchers from cybersecurity vendor Trend Micro are urging developers to secure and monitor their Docker remote API servers after attacks by threat actors targeting the systems to install a Linux malware and ...
StackGen Extends AI Platform for Generating IaC Code to Argo CD Platform
StackGen, formerly appCD, has added an ability to automatically generate Helm charts that are used to deploy cloud-native applications using the open-source Argo continuous delivery (CD) platform running in Kubernetes environments ...

