Automating Security Controls Across Container Workloads With Snyk, Docker and AWS

Automating Security Controls Across Container Workloads With Snyk, Docker and AWS

What constitutes an application has changed as cloud deployments transform more of what was traditionally ‘infrastructure’ to code, putting more pressure on development and security teams to build inherently secure applications. Code ...
|

StackRox Extends Its Security Controls Across Container Operating Systems, Cloud Marketplaces, and Ecosystem Partners

New and enhanced capabilities enable customers to rapidly operationalize security across their various container and Kubernetes environments MOUNTAIN VIEW, Calif. — October 3, 2019 — StackRox, the leader in container and Kubernetes ...
| | StackRox
Security Controls and Aqua Security 3

DevOps Chat: Kubernetes, Security Controls and Aqua Security 3

In this combination DevOps Chat and Security Boulevard Chat, we catch up with Rani Osnat of Aqua Security and one of our favorite folks to interview. Rani brings up to speed on ...
| | aquasec, chat, kubernetes
microservices, opentelemetry, data, Grafana, OpenTelemetry Argo NeuVector Extends Red Hat OpenShift Availability

NeuVector Extends Red Hat OpenShift Availability with Role-Based Access Controls for Automated Run-Time Container Security

The container firewall leader also adds Red Hat Container Registry scanning and a Jenkins plugin to automate vulnerability scanning during development SAN FRANCISCO – RED HAT SUMMIT – May 8, 2018 – NeuVector, ...
| | NeuVector, red hat
network, logistics, security, Traefik Tigera container security Calico Red Hat Dynatrace

Securing The Digital Supply Chain: Network Security Best Practices for Cloud-Native Logistics

As the logistics industry evolves toward fully digitized, cloud-native infrastructures, security has become an urgent and complex priority ...
tools, security, kubernetes, PKI, security, networking, AI, Kubernetes, AppViewX Securing containers

Security in Kubernetes: Your Stack is Lying to You 

The organizations that succeed will not be the ones with the most tools. They will be the ones that treat security as code, embed it into every commit and align their practices ...
containers, security, air-gapped, Kubernetes, air gapped SUSE container Weaveworks container security ThreatStack Qualys

Addressing Container Security Challenges in DevOps Workflows

Developing scalable, effective software today means ensuring everything runs in a cloud environment. Containerization has become the dominant approach — and justifiably so — but containers alone are not a perfect security ...
tools, security, kubernetes, PKI, security, networking, AI, Kubernetes, AppViewX Securing containers

Hardening Kubernetes Security with DevSecOps Practices

As organizations embrace the speed of Kubernetes, they often find their existing security practices lagging, creating a dangerous gap between development velocity and security posture ...
reflecting, year-end thoughts, predictions

Reflecting on 2024 and Looking Ahead to 2025: Cloud-Native DevOps, Security and the Road Ahead

As we close out 2024, the story of cloud-native and DevOps has never been more critical—or complex. In short, the s^iT is real now. Kubernetes and microservices architectures have become the de ...
Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

Survey Surfaces Raft of Cloud Native Application Security Challenges

Venafi, a unit of CyberArk, today published a survey of 800 security and IT decision-makers in the U.S. and Europe finds 86% of respondents work for organizations that have experienced a security ...
| | cloud native security