posture, security posture management, KSPM, Kubernetes KSPM cloud-native Fugue security

Ensuring Cybersecurity in Cloud-Native Deployments

The shift to cloud native has many benefits, but has also created a new set of challenges pertaining to cybersecurity ...
Cilium containerized network Remote.It service mesh eBPF

What’s New With Cilium and What’s Next?

There's great potential for Cilium, the eBPF-based technology unlocking a new era of kernel-centric network engineering ...
KSOC Solo.io access Elastic Kubernetes

Solo.io Delivers on Cilium Support Promise for Gloo Networks

Solo.io's Gloo Network now supports virtual networks based on the open source Cilium virtual networking software ...
Grafana Labs observability

Grafana Labs Dives Deeper Into Kubernetes Observability

Grafana Labs extended its observability support for Kubernetes environments to simplify monitoring and troubleshooting and reduce costs ...
New Relic cloud-native no-code

Embracing Code-Driven Security for Cloud-Native Ecosystems

While flexible and scalable, cloud-native architectures introduce new security challenges due to their complexity and dynamic nature ...
Kubernetes U.S. Army

The Kubernetes Singularity

Kubernetes is becoming central to how clouds work, and the best home for large-scale open source generative AI ...
Kubernetes Is Gaining Momentum, but Security Still Lags Behind

Kubernetes Is Gaining Momentum, but Security Still Lags Behind

While many organizations understand the potential benefits of Kubernetes, fewer understand the platform's cybersecurity vulnerabilities ...
AI, containers, kuberneted, databases DH2i Postgres data Red Hat storage IBM Yugabyte Database

Closer to Serverless for Databases on Kubernetes

Running stateful elements like databases on Kubernetes has led to new and unique challenges and opportunities, particularly in autoscaling ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Kubernetes Phishing: Preventing Social Engineering in Your K8s Environment

As Kubernetes becomes a mainstream platform for operating mission-critical applications, it is increasingly targeted by cybercriminals ...
KSOC Solo.io access Elastic Kubernetes

KSOC Adds Tools to Strengthen Kubernetes Security

KSOC made generally available a zero-trust policy generator to make it simpler to manage RBAC for Kubernetes clusters ...
| | access control, IAM, KSOC, RBAC, security