DevSecOps
5 Surprising Uses for Docker Debug
Beyond troubleshooting, the Debug command can help improve the performance and resource utilization of Docker containers ...
Cerbos Managed Authorization Service Leverages Wasm
Cerbos announced today that its Cerbos Hub managed service based on open source authorization software is now available in beta ...
CloudBees Brings Modern DevSecOps Platform to Amazon EKS
CloudBees' recently unveiled DevSecOps platform is now generally available on the Amazon Elastic Kubernetes Service (Amazon EKS) ...
How Cloud-Native Zero-Trust Could Up its Game With Permissions
The cloud-native world could learn a thing or two from the simplicity of mobile application permissions ...
Sweet Security Unfurls Cloud-Native Runtime Protection Platform
Sweet Security today launched a Cloud Runtime Security Suite platform for securing cloud-native application runtimes ...
Automating Security in Containers With DevSecOps
Containers have become incredibly popular in software development. They make it easy for organizations to quickly build, deploy and manage scalable and efficient applications. However, as more and more organizations adopt container ...
Red Hat Adds Interconnect and Cybersecurity Services for Kubernetes
Red Hat today added a Red Hat Service Interconnect to its portfolio that is based on an open source Skupper.io project that enables Layer 7 networking between application components running on different ...
KSOC Publishes SBOM Specification for Kubernetes
Kubernetes Security Operations Center (KSOC) this week published a Kubernetes Bill of Materials (KBOM) specification that promises to make it simpler to discover vulnerabilities. KBOM, available via an open source command line ...
8 Tips for Successful Container Vulnerability Scanning
Container vulnerability scanning is a critical part of container security. It involves inspecting container images and their components to identify potential security issues, weaknesses or vulnerabilities. Containers are lightweight, portable units used ...
Privilege Escalation in Cloud-Native App Production Environments
With today’s modern digital applications, managing access permissions during operational events is crucial to ensuring the safety and security of an organization’s production applications and infrastructure. A common and essential security principle, ...