mapping Backslash Red Hat edge streaming CNCF VMware Ambassador Labs value stream mapping

Backslash Security Unveils Tool to Visualize Cloud-Native Code Flows

Backslash Security emerged from stealth today to provide IT teams with a visual tool that identifies workflows in cloud-native code that could lead to a security breach. Fresh from raising $8 million ...
DevSecOps Google Automation and Orchestration in a Container World

DevSecOps Use Cases for AI-Assisted Kubernetes

As indicated in my blog DevOps Use Cases for AI-Assisted Kubernetes, an AI-assisted Kubernetes orchestrator has a number of different use cases to optimize cloud costs for DevOps, DevSecOps and SRE. This ...
AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Ermetic Adds Kubernetes Support to CNAPP

Ermetic has added Kubernetes support to its cloud-native application protection platform (CNAPP) that enables IT and cybersecurity teams to discover and fix misconfigurations, compliance violations and risky or excessive privileges. Amy Ariel, ...
Advanced Container Security: Auto-Benchmarking, Pentesting, XDR and More

Advanced Container Security: Auto-Benchmarking, Pentesting, XDR and More

Container security refers to the set of practices, tools and technologies used to secure containerized applications and the underlying infrastructure they run on. This includes securing the container images and runtime environment, ...
Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

Cybersecurity in Cloud-Native Environments

The rapid adoption of the cloud has broadened the horizons for businesses embarking on a digital transformation journey, and organizations are swiftly taking the leap to cloud-native applications that are built using ...
zero-trust, Tigera zero-trust GitOps DevSecOps Kubernetes

Tigera Looks to Secure Kubernetes Runtime Environments

Tigera today added a Calico Runtime Threat Defense platform for securing Kubernetes runtimes using a combination of signature and behavior-based techniques. Utpal Bhatt, chief marketing officer for Tigera, says this latest addition ...
zero-trust services cloud-native permissions CNCF SOA vs. Microservices Monitoring

Just-in-Time Permissions in Microservices-Based Applications

In a previous article, we discussed keeping microservices secure, even from themselves. But what else can you do to keep your application free of vulnerabilities that could be exploited by bad actors? ...
Kubernetes mirantis lens

Using the Kubernetes Lens Dashboard to Boost Kubernetes Security

Kubernetes security is a complex challenge. Luckily, new open source tools are springing up to help address it. I’ll discuss a new, popular tool called Kubernetes Lens, which is making Kubernetes clusters ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

CNCF to Add Another Security Certification

At the CloudNative SecurityCon North America 2023 conference today, the Cloud Native Computing Foundation (CNCF) announced that it will release a Kubernetes and cloud security associate (KCSA) certification. The KCSA certification will ...
Red Hat Managed OpenShift Service

Red Hat OpenShift Update Extends Reach of Operators for Kubernetes

Red Hat today released updates to the Kubernetes-based Red Hat OpenShift platform, adding Operators to simplify security, compliance and networking. In addition, Red Hat is adding support for instances of Arm processors ...