containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

5 Reasons to Back Up Kubernetes Applications

Software containers are at the heart of cloud-native business transformation initiatives, and they are a natural evolution from virtual machines to a more granular and portable application environment in clouds. Containers are ...
Threat Stack monolith microservices

Threat Stack Deepens Threat Discovery Reach for Amazon EKS

Threat Stack announced today it is extending its threat monitoring platform for the public cloud service from Amazon Web Services (AWS) to include the Amazon Elastic Kubernetes Service (Amazon EKS) on the ...
Kubernetes Pure Storage SODA Kasten by Veeam LINBIT to Bring Open Source

SODA Foundation Extends Open Source Storage Reach to K8s

The SODA Foundation has added support for the container storage interface (CSI) used to attach storage systems running its open source software-defined storage (SDS) software to Kubernetes clusters. In addition to providing ...
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Misconfigured Argo Workflows Expose K8s to Attack

With the use of Kubernetes growing rapidly among enterprises comes increased opportunities for attackers to exploit the popular container orchestration platform’s weaknesses in security. This week, security specialist Intezer has detected a ...
Lacework Red Hat Aqua Security

Aqua Security Survey Surfaces Container Security Knowledge Gap

Aqua Security today published a survey that polled a mix of 150 cloud-native security practitioners and IT executives that suggests awareness of potential container security issue is dangerously low at a time ...
modernization containers AI edge hardened container

Using Containers to Enable AI at the Edge

When the COVID-19 crisis struck, medical professionals quickly realized that this unprecedented situation required them to think differently and use cutting-edge technology; they soon recognized the value of applying artificial intelligence (AI) ...
API Sysdig Apolicy ADC

Sysdig Acquires Apolicy to Automate Container Security

Sysdig today announced it intends to acquire Apolicy to add an ability to automate remediation of container infrastructure misconfigurations provisioned using tools such as Terraform. Terms of the deal were not disclosed ...
containers, AI, Kubernetes, cloud-native security IBM Kubernetes

The What and Why of Cloud-Native Security

On the road to embracing DevOps, many IT organizations still depend on traditional security practices, policies and tools that were not built to withstand the modern cloud-native approaches of scaling and complexity ...
phase kubernetes maturity model

Kubernetes Maturity Phase 4: Security, Efficiency and Reliability

In our earlier articles, we introduced the Kubernetes maturity model, discussed how to prepare for Kubernetes, explored the transformation phase, planned deployment and built confidence in successful deployment. Now, you’re ready to ...
Analyzing the Recent 'Kubernetes and Cloud Native Operations' Report - Techstrong TV

Analyzing the Recent ‘Kubernetes and Cloud Native Operations’ Report – Techstrong TV

Alan and David discuss the findings of our recent ‘Kubernetes and Cloud Native Operations Report.’ Alan Shimel:               Hey, everyone. Welcome to another segment on Techstrong TV ...