TLS, certificates, Docker, vulnerabilities, supply chain, KubeCon, SigStore, Kubernetes TrapX container security

Best of 2022: 4 Best Practices for Kubernetes Reliability

As we close out 2022, we at Container Journal wanted to highlight the most popular articles of the year. Following is the latest in our series of the Best of 2022. One ...
zero-trust, Tigera zero-trust GitOps DevSecOps Kubernetes

Tigera Makes Implementing Zero-Trust for Kubernetes Easier

Tigera announced today it is making it simpler to implement zero-trust policies at the namespace level across multiple Kubernetes clusters. Kubernetes clusters make it possible to implement security policies at the pod ...
AWS Strengthens Container Security in the Cloud

AWS Strengthens Container Security in the Cloud

Amazon Web Services (AWS) has extended the reach of the Amazon GuardDuty security monitoring service to include threat detection for the runtime environments in which containers are deployed. In addition, AWS Nitro ...
Ingress Kubescape Kubernetes Docker

Kubescape Adds Vulnerability Scanning Capabilities

Kubescape, an end-to-end, open source security platform built on Kubernetes technology, has added new functionality to help scan for vulnerabilities. The platform, created by Israeli software developers from Armo, has become one ...
Keeping Kubernetes Data Safe, Sound and Actionable

Keeping Kubernetes Data Safe, Sound and Actionable

As cloud-native development grows in popularity, organizations are on the hunt for tools to not only protect their containerized applications but to manage them, as well.  They’ll be busy. IDC is projecting ...
platform engineering Kubernetes continuous testing

5 Kubernetes Pain Points and How to Solve Them

Kubernetes is an open source orchestration platform for managing Linux containers in private, public and hybrid cloud environments. It is also commonly used to manage a microservices architecture. Containers and Kubernetes can ...
The Principle of Least Privilege in Cloud-Native Applications

The Principle of Least Privilege in Cloud-Native Applications

Modern applications require modern security. Public cloud vendors are highly motivated to ensure their platforms are not the subject of security attacks that chip away at customers’ trust and well-being. In cloud-native ...
Kubernetes Rapid7 container security

Learning From Kubernetes Vulnerabilities

As Kubernetes has become a widely popular and critical infrastructure component in the modern software stack for small to large organizations, it has also become more susceptible to attacks. Developers typically use ...
GitOps, pipelines, Jenkins, kubernetes, kpack, buildpacks, CI/CD, Codefresh, Komodor, AI, clusters, kubernetes, generative AI Kubernetes Argo container security continuous SQL Server Windocks Tekton Kubeflow Red Hat CI/CD

Kubernetes Security in Your CI/CD Pipeline

Kubernetes security involves implementing security measures and tools and adopting best practices for protecting Kubernetes workloads. Kubernetes is an open source container management platform across public, private and hybrid clouds. Organizations employ ...
CrowdStrike Cryptojacking Linode

CrowdStrike Details Sophisticated Container Cryptojacking Campaign

At the KubeCon + CloudNativeCon North America conference today, CrowdStrike revealed details of a complex cryptojacking campaign targeting vulnerable Docker and Kubernetes infrastructure. The campaign employs a combination of an obscure domain ...