devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Automating Security in Containers With DevSecOps

Containers have become incredibly popular in software development. They make it easy for organizations to quickly build, deploy and manage scalable and efficient applications. However, as more and more organizations adopt container ...
The State of Cloud-Native Security

The State of Cloud-Native Security

Cloud native is becoming the defacto development method for new applications and workloads. Yet, the cloud-native trend also brings accelerated deployment timelines, which could leave security gaps in CI/CD. Studies also find ...
Portworx Adds Data Migration Tools

Securing Cloud-Native Data in Transit

Data is central to all cloud-native applications, and keeping that data safe and secure is a challenge all application owners struggle with. When discussing securing the data you use with your cloud-native ...
Kubernetes step 3 Big Steps in Container Adoption

2023 Benchmark Kubernetes Report: 6 K8s Reliability Missteps

The cloud is increasingly the preferred destination for organizations to build their applications and services. Despite a year dominated by headlines about economic uncertainty as inflation grows and banks teeter, most organizations ...
KSOC Kubernetes

KSOC Shares List of Top Eight Kubernetes Vulnerabilities

Kubernetes Security Operations Center (KSOC) has published a list of the eight Kubernetes vulnerabilities that are most likely to be exploited. The list is based on an Exploit Prediction Scoring System (EPSS) ...
Portworx Morpheus Data data protection

Securing Cloud-Native Data at Rest

Data is central to all cloud-native applications, and keeping that data safe and secure is a challenge all application owners struggle with. When discussing securing the data you use with your cloud-native ...
Kubernetes business

Kubernetes Geek Talk: Understanding Pod Status

In the Kubernetes architecture, a pod is the smallest and simplest unit that can be created and deployed. A pod consists of one or more containers that are tightly coupled and share ...
Akuity, SUSE, Nutanix, kubernetes, cycle, Mirantis, kubernetes, LoftLabs, vNode, Komodor, configurations, application, clusters, virtual, Red Hat, Kubernetes clusters, Komodor, kubernetes, clusters, kubernetes, IDPs, TLS, certificates, clusters, virtual clusters, Kubernetes, Kubernetes, vCluster CAST AI KBOM DoKC Platform9 Kubernetes

Why You Need a Kubernetes Bill of Materials (KBOM)

You’ve probably heard of software bills of materials (SBOMs). And you may already be familiar with infrastructure bills of materials (IBOM) as well. Both ideas are garnering much attention lately as a ...
Red Hat Adds Interconnect and Cybersecurity Services for Kubernetes

Red Hat Adds Interconnect and Cybersecurity Services for Kubernetes

Red Hat today added a Red Hat Service Interconnect to its portfolio that is based on an open source Skupper.io project that enables Layer 7 networking between application components running on different ...
How Kubernetes Adoption Fosters Cloud Resiliency

How Kubernetes Adoption Fosters Cloud Resiliency

In the last few years, we’ve seen Kubernetes become businesses’ default container orchestration tool, and it’s easy to understand why. With IT teams’ reliance on containers growing as they increasingly prioritize agile ...