Cloud-Native Security

Best of 2022: 4 Best Practices for Kubernetes Reliability
As we close out 2022, we at Container Journal wanted to highlight the most popular articles of the year. Following is the latest in our series of the Best of 2022. One ...

Tigera Makes Implementing Zero-Trust for Kubernetes Easier
Tigera announced today it is making it simpler to implement zero-trust policies at the namespace level across multiple Kubernetes clusters. Kubernetes clusters make it possible to implement security policies at the pod ...

AWS Strengthens Container Security in the Cloud
Amazon Web Services (AWS) has extended the reach of the Amazon GuardDuty security monitoring service to include threat detection for the runtime environments in which containers are deployed. In addition, AWS Nitro ...

Kubescape Adds Vulnerability Scanning Capabilities
Kubescape, an end-to-end, open source security platform built on Kubernetes technology, has added new functionality to help scan for vulnerabilities. The platform, created by Israeli software developers from Armo, has become one ...

Keeping Kubernetes Data Safe, Sound and Actionable
As cloud-native development grows in popularity, organizations are on the hunt for tools to not only protect their containerized applications but to manage them, as well. They’ll be busy. IDC is projecting ...

5 Kubernetes Pain Points and How to Solve Them
Kubernetes is an open source orchestration platform for managing Linux containers in private, public and hybrid cloud environments. It is also commonly used to manage a microservices architecture. Containers and Kubernetes can ...

The Principle of Least Privilege in Cloud-Native Applications
Modern applications require modern security. Public cloud vendors are highly motivated to ensure their platforms are not the subject of security attacks that chip away at customers’ trust and well-being. In cloud-native ...

Learning From Kubernetes Vulnerabilities
As Kubernetes has become a widely popular and critical infrastructure component in the modern software stack for small to large organizations, it has also become more susceptible to attacks. Developers typically use ...

Kubernetes Security in Your CI/CD Pipeline
Kubernetes security involves implementing security measures and tools and adopting best practices for protecting Kubernetes workloads. Kubernetes is an open source container management platform across public, private and hybrid clouds. Organizations employ ...

CrowdStrike Details Sophisticated Container Cryptojacking Campaign
At the KubeCon + CloudNativeCon North America conference today, CrowdStrike revealed details of a complex cryptojacking campaign targeting vulnerable Docker and Kubernetes infrastructure. The campaign employs a combination of an obscure domain ...