Cloud-Native Security

Sysdig Report Surfaces Major Lack of Container Security
A new Sysdig report finds 87% of container images have high-risk vulnerabilities of which 15% make their way into runtime environments. The report also finds that 71% of those vulnerabilities have a ...

Keep Microservices Secure, Even From Themselves
Cloud-native applications make heavy use of services and microservice architectures. Distributed applications provide many benefits to modern application development processes and lend themselves particularly well to applications deployed in the public cloud ...

Venafi Adds Kubernetes Support to Certificate Management Platform
Venafi this week added an ability to manage Kubernetes cluster identities to the control plane it currently provides, extending zero-trust down to individual machines using the transport layer security (TLS) protocol. Shivajee ...

Overcoming Container Security Gaps With Active Vulnerability Management
Organizations can reduce security risks in containerized applications by actively managing vulnerabilities through scanning, automated image deployment, tracking runtime risk and deploying mitigating controls. Kubernetes and containers have become de facto standards ...

Why You Shouldn’t Use a Jump Server to Protect Kubernetes’ API
Kubernetes has become the de facto standard in running and managing workloads. A Kubernetes cluster comprises multiple resources (such as machines, CPUs, memory, storage, etc.) and software components with multiple purposes. The ...

Container Firewalls: What Are the Options?
Container firewalls are security tools that protect containerized applications and the host environment they run on from malicious traffic and threats. Containers are a lightweight and portable way to package and deploy ...

Cloud-Native Applications are Like Nuclear Submarines
Have you seen the movie Crimson Tide? Every person architecting a cloud-native application should see this movie. In it, a breakaway Russian government threatens a nuclear attack on the United States. A ...

Building Cloud-Native Applications Using Isolation Zones
Cloud-native architectures are perfect for creating and operating modern, innovative applications. Cloud-native applications provide many advantages both to consumers of the applications and to those building and managing them. But bad actors ...

Best of 2022: Hardening Kubernetes Multi-Cluster Environments
As we close out 2022, we at Container Journal wanted to highlight the most popular articles of the year. Following is the latest in our series of the Best of 2022. Kubernetes ...

Best of 2022: Implementing Zero-Trust on Kubernetes
As we close out 2022, we at Container Journal wanted to highlight the most popular articles of the year. Following is the latest in our series of the Best of 2022. As ...