zero-trust services cloud-native permissions CNCF SOA vs. Microservices Monitoring

Just-in-Time Permissions in Microservices-Based Applications

In a previous article, we discussed keeping microservices secure, even from themselves. But what else can you do to keep your application free of vulnerabilities that could be exploited by bad actors? ...
Kubernetes mirantis lens

Using the Kubernetes Lens Dashboard to Boost Kubernetes Security

Kubernetes security is a complex challenge. Luckily, new open source tools are springing up to help address it. I’ll discuss a new, popular tool called Kubernetes Lens, which is making Kubernetes clusters ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

CNCF to Add Another Security Certification

At the CloudNative SecurityCon North America 2023 conference today, the Cloud Native Computing Foundation (CNCF) announced that it will release a Kubernetes and cloud security associate (KCSA) certification. The KCSA certification will ...
Red Hat Managed OpenShift Service

Red Hat OpenShift Update Extends Reach of Operators for Kubernetes

Red Hat today released updates to the Kubernetes-based Red Hat OpenShift platform, adding Operators to simplify security, compliance and networking. In addition, Red Hat is adding support for instances of Arm processors ...
CloudCasa Sysdig containers CommVault

Sysdig Report Surfaces Major Lack of Container Security

A new Sysdig report finds 87% of container images have high-risk vulnerabilities of which 15% make their way into runtime environments. The report also finds that 71% of those vulnerabilities have a ...
Keep Microservices Secure, Even From Themselves

Keep Microservices Secure, Even From Themselves

Cloud-native applications make heavy use of services and microservice architectures. Distributed applications provide many benefits to modern application development processes and lend themselves particularly well to applications deployed in the public cloud ...
Venafi container vulnerabilities

Venafi Adds Kubernetes Support to Certificate Management Platform

Venafi this week added an ability to manage Kubernetes cluster identities to the control plane it currently provides, extending zero-trust down to individual machines using the transport layer security (TLS) protocol. Shivajee ...
cloud-native vulnerabilities Harbor registry

Overcoming Container Security Gaps With Active Vulnerability Management

Organizations can reduce security risks in containerized applications by actively managing vulnerabilities through scanning, automated image deployment, tracking runtime risk and deploying mitigating controls. Kubernetes and containers have become de facto standards ...
Kubernetes IBM Aligns With Twistlock on Container Security

Why You Shouldn’t Use a Jump Server to Protect Kubernetes’ API

Kubernetes has become the de facto standard in running and managing workloads. A Kubernetes cluster comprises multiple resources (such as machines, CPUs, memory, storage, etc.) and software components with multiple purposes. The ...
firewall, aviatrix, cloud native security, kubernetes, hardening Aqua Security

Container Firewalls: What Are the Options?

Container firewalls are security tools that protect containerized applications and the host environment they run on from malicious traffic and threats.  Containers are a lightweight and portable way to package and deploy ...