Features
TDengine Brings Open Source Time-Series Database to Kubernetes
TDengine today made available an update to its namesake open source time-series database so that it can now run on Kubernetes clusters. TDengine CEO Jeff Tao says TDengine 3.0 is differentiated from ...
Preparing Your Incident Response Team for Container Incidents
The use of containers—and orchestration platforms like Kubernetes—is increasing rapidly around the globe. Analysts predict that by 2023, more than 70% of global organizations will be running more than two containerized applications ...
Granulate Tool Automatically Rightsizes Kubernetes Workloads
This week, Granulate will add a free gMaestro tool to its existing portfolio of tools for optimizing workloads on Kubernetes clusters. The new tool makes it possible to reduce overprovisioning of infrastructure ...
Red Hat Extends OpenShift Platform Plus Environment
Red Hat today furthered its efforts to provide a complete curated Kubernetes environment with an update to its Red Hat OpenShift Platform Plus offering that provides a raft of additional management and ...
The NSA Wants the Network Locked Down
The NSA’s Kubernetes Hardening Guide offers a lot of advice on implementing the best defense-in-depth approach to your workloads. Part of that guide outlines how Kubernetes users can secure and harden the ...
Aqua Security Finds New Cryptojacking Technique
Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data ...
NSA’s Kubernetes Hardening Guidelines and Pod Security
I previously asked (and answered) the question, What Are the NSA K8s Guidelines and Why Should You Care? I suggested that the first step to compliance is to understand your Kubernetes environment ...
Deepfence Expands Scope of Open Source Container Security Platform
Deepfence today announced it has updated its open source ThreatMapper project to add expanded visualizations of attack paths and a scanner based on the YARA tool many security researchers use to identify ...
Sysdig Employs AI to Thwart Container Cryptojacking Attacks
At the Black Hat USA 2022 conference, Sysdig today revealed it is adding machine learning algorithms capable of detecting cryptojacking attacks to its cloud service for securing container applications. The algorithms are ...
CloudNativeDay: Google Sees Containers Improving App Reliability
Containers and serverless computing frameworks play a critical role in making environments more resilient as organizations increasingly depend on the availability of applications to drive revenue. Steve McGhee, co-author of Enterprise Roadmap ...

