Features

Aqua Security Finds New Cryptojacking Technique
Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data ...

NSA’s Kubernetes Hardening Guidelines and Pod Security
I previously asked (and answered) the question, What Are the NSA K8s Guidelines and Why Should You Care? I suggested that the first step to compliance is to understand your Kubernetes environment ...

Deepfence Expands Scope of Open Source Container Security Platform
Deepfence today announced it has updated its open source ThreatMapper project to add expanded visualizations of attack paths and a scanner based on the YARA tool many security researchers use to identify ...

Sysdig Employs AI to Thwart Container Cryptojacking Attacks
At the Black Hat USA 2022 conference, Sysdig today revealed it is adding machine learning algorithms capable of detecting cryptojacking attacks to its cloud service for securing container applications. The algorithms are ...

CloudNativeDay: Google Sees Containers Improving App Reliability
Containers and serverless computing frameworks play a critical role in making environments more resilient as organizations increasingly depend on the availability of applications to drive revenue. Steve McGhee, co-author of Enterprise Roadmap ...

The 5 Top App Definition and Build Tools From CNCF
Kubernetes has evolved to become the foundation of the modern cloud-native stack. Yet, adopting this lovable beast of a container platform doesn’t come without its hurdles. Thankfully, many toolsets now exist to ...

Cloud-Native Collision: Security and Cloud Center of Excellence
The migration of enterprise applications and infrastructure to cloud-native architectures is a hot topic—and a very complex one. While we may want to believe digital transformation efforts and cloud migration projects have ...

Why Kubernetes is the ‘Secret Sauce’ for Bank Digitization
Google “banking” and “disruption,” and nearly 200 hits sprawl across more than 20 pages of search results. The high interest in banking disruption isn’t surprising. Though disruption is a favorite business buzzword ...

3 CNCF Tools For Cloud-Native Chaos Engineering
When software is released into the world, it takes on a life of its own. It’s often hard to predict how people will use it—it’s even harder to predict how people will ...

Securing Containers With Zero-Trust Tools
As container environments grow in complexity, container security requires a different security approach. Container security must consider everything from the applications running in containers to the infrastructure on which those containers run. ...