Kubernetes Security

Automating Security Compliance in GKE with Policy-as-Code
As organizations increasingly adopt Kubernetes for their container orchestration needs, ensuring security compliance across clusters becomes paramount ...

Kubernetes Disaster Recovery: Best Practices and Methods
Kubernetes is the backbone of many contemporary infrastructure systems, and any compromise or failure can cause widespread issues ...

Prioritizing Holistic Security Posture Management to Address Growing Threats to Containers and Kubernetes
Security posture management is a broad concept encompassing everything an organization can do to prevent security incidents and is critically important in the world of containers and Kubernetes ...

Mirantis Releases k0smotron 1.0 to Simplify Kubernetes Cluster Management
k0smotron enables IT teams to host and manage Kubernetes control planes as containers within a cluster ...

Using the Kubernetes Lens Dashboard to Boost Kubernetes Security
Kubernetes security is a complex challenge. Luckily, new open source tools are springing up to help address it. I’ll discuss a new, popular tool called Kubernetes Lens, which is making Kubernetes clusters ...

Keep Microservices Secure, Even From Themselves
Cloud-native applications make heavy use of services and microservice architectures. Distributed applications provide many benefits to modern application development processes and lend themselves particularly well to applications deployed in the public cloud ...

Why You Shouldn’t Use a Jump Server to Protect Kubernetes’ API
Kubernetes has become the de facto standard in running and managing workloads. A Kubernetes cluster comprises multiple resources (such as machines, CPUs, memory, storage, etc.) and software components with multiple purposes. The ...

Sysdig Adds Ability to Make Container Runtimes Immutable
Sysdig today added a Drift Control capability to its container security platform that makes it possible to lock down runtime environments. Daniella Pontes, senior manager for product marketing at Sysdig, says IT ...

Understanding Container Security – Part Two: Security Recommendations
In part one of this series, we discussed the rise in container security threats. As containers have gained in popularity, they’ve also provided an expanding attack surface. We explored why so many ...

Understanding Container Security – Part One: Security Gaps
In our recent interview with Aqua Security’s Rory McCune about CRI-O vulnerability CVE-2022-0811, he mentioned that he’d seen a sharp rise in container cybersecurity threats this year. His experience isn’t unusual; last ...