CNCF, Kubernetes, SUSECON, SUSE, cloud-native, stack, CNCF, cert manager, guidance, patent, cloud native, CNCF Advances Linkerd Service Mesh cloud-native

The Hidden Security Risk in Cloud-Native: Out-of-Date Software

The cloud-native world is highly focused on security, but a surprising number of organizations may be falling behind on one important task: Keeping their software up-to-date with the latest patches and security ...
Docker, secrets, gitguardian Thycotic Kubernetes secrets

Hard Truths of Kubernetes Secrets Management

The recent CircleCI breach highlights the risk of storing secrets in places like private code repositories (GitHub), scripts, configuration files, files encrypted at rest, CI/CD pipeline code or even Kubernetes Secrets where they cannot ...
AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Fairwinds Automates Remediation of Kubernetes Misconfigurations

Fairwinds this week added an Automated Fix Pull Requests (PRs) capability to its commercial platforms that identifies and automatically remediates Kubernetes misconfigurations. Joe Pelletier, vice president of product at Fairwinds, says this ...
microsoft, azure,

Are Your Kubernetes Workloads Secure? Unsettling Trends in Latest Benchmark

The World Economic Forum says that, despite the economic downturn, we should be prioritizing digital transformation because it enables growth and innovation. Inevitably, digital transformation plans today rely on the scalability and ...
mapping Backslash Red Hat edge streaming CNCF VMware Ambassador Labs value stream mapping

Backslash Security Unveils Tool to Visualize Cloud-Native Code Flows

Backslash Security emerged from stealth today to provide IT teams with a visual tool that identifies workflows in cloud-native code that could lead to a security breach. Fresh from raising $8 million ...
DevSecOps Google Automation and Orchestration in a Container World

DevSecOps Use Cases for AI-Assisted Kubernetes

As indicated in my blog DevOps Use Cases for AI-Assisted Kubernetes, an AI-assisted Kubernetes orchestrator has a number of different use cases to optimize cloud costs for DevOps, DevSecOps and SRE. This ...
AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Ermetic Adds Kubernetes Support to CNAPP

Ermetic has added Kubernetes support to its cloud-native application protection platform (CNAPP) that enables IT and cybersecurity teams to discover and fix misconfigurations, compliance violations and risky or excessive privileges. Amy Ariel, ...
Advanced Container Security: Auto-Benchmarking, Pentesting, XDR and More

Advanced Container Security: Auto-Benchmarking, Pentesting, XDR and More

Container security refers to the set of practices, tools and technologies used to secure containerized applications and the underlying infrastructure they run on. This includes securing the container images and runtime environment, ...
runtime, visibility, Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

Cybersecurity in Cloud-Native Environments

The rapid adoption of the cloud has broadened the horizons for businesses embarking on a digital transformation journey, and organizations are swiftly taking the leap to cloud-native applications that are built using ...
zero-trust, Tigera zero-trust GitOps DevSecOps Kubernetes

Tigera Looks to Secure Kubernetes Runtime Environments

Tigera today added a Calico Runtime Threat Defense platform for securing Kubernetes runtimes using a combination of signature and behavior-based techniques. Utpal Bhatt, chief marketing officer for Tigera, says this latest addition ...