Building Secure Multi-Tenant Container Platforms

Building Secure Multi-Tenant Container Platforms

Building and securing a multi-tenant container platform requires an advanced multi-tenancy architecture to ensure every aspect can be managed effectively. The platform should perform a wide range of functions, from creating secure, ...
Kubernetes U.S. Army

KSOC Publishes SBOM Specification for Kubernetes

Kubernetes Security Operations Center (KSOC) this week published a Kubernetes Bill of Materials (KBOM) specification that promises to make it simpler to discover vulnerabilities. KBOM, available via an open source command line ...
container vulnerability scanning

8 Tips for Successful Container Vulnerability Scanning

Container vulnerability scanning is a critical part of container security. It involves inspecting container images and their components to identify potential security issues, weaknesses or vulnerabilities. Containers are lightweight, portable units used ...
privilege

Privilege Escalation in Cloud-Native App Production Environments

With today’s modern digital applications, managing access permissions during operational events is crucial to ensuring the safety and security of an organization’s production applications and infrastructure. A common and essential security principle, ...
posture, security posture management, KSPM, Kubernetes KSPM cloud-native Fugue security

Achieving Kubernetes Security Posture Management (KSPM)

Kubernetes has emerged as the de facto standard for container orchestration. It introduces powerful management capabilities, but it also presents some formidable security challenges—especially in multi-cloud environments. These include a lack of ...
CI/CD, GitOps, pipelines, Jenkins, kubernetes, kpack, buildpacks, CI/CD, Codefresh, Komodor, AI, clusters, kubernetes, generative AI Kubernetes Argo container security continuous SQL Server Windocks Tekton Kubeflow Red Hat CI/CD

Securing Container Images Across the CI/CD Pipeline

The Log4j vulnerability was a good reminder that securing cloud-native applications requires ensuring container images are free of critical vulnerabilities. When Log4j went public, security teams struggled to quickly understand which of ...
Kubernetes cost cloud Day 2

Day 2 Kubernetes Cost Challenges

Kubernetes provides a powerful container orchestration platform, enabling you to efficiently deploy, scale and manage containerized applications. But like any other technology, Kubernetes comes with its own long-term challenges that could be ...
namespace sprawl Rackspace Adds Managed Kubernetes Service

Overcoming Kubernetes Namespace Limitations

As companies are standardizing on Kubernetes and moving more of their workloads to the platform, the need emerges for resource isolation and, more generally, multi-tenancy features. Kubernetes Namespaces are the tool of ...
metrics, agents, ai, cloud-native, cloud native, project, istio, ambient, architecture, modules, cloud native, CCoE Kubernetes Virtana CrowdStrike cloud native

Kubernetes Security is the Future of Cloud Security

By 2025, securing Kubernetes (K8s) will be recognized as the most important aspect of cloud security. In the most successful organizations, CTOs and CISOs already understand the importance of Kubernetes security. But ...
AWS TriggerMesh integration Pure Storage Portworx

AWS Extends GuardDuty Reach to Cloud-Native Services

Amazon Web Services (AWS) this week extended the reach of its Amazon GuardDuty cybersecurity threat detection service to its Kubernetes distribution and the Lambda serverless framework in addition to Amazon Aurora databases ...