The Principle of Least Privilege in Cloud-Native Applications

The Principle of Least Privilege in Cloud-Native Applications

Modern applications require modern security. Public cloud vendors are highly motivated to ensure their platforms are not the subject of security attacks that chip away at customers’ trust and well-being. In cloud-native ...
Kubernetes Rapid7 container security

Learning From Kubernetes Vulnerabilities

As Kubernetes has become a widely popular and critical infrastructure component in the modern software stack for small to large organizations, it has also become more susceptible to attacks. Developers typically use ...
GitOps, pipelines, Jenkins, kubernetes, kpack, buildpacks, CI/CD, Codefresh, Komodor, AI, clusters, kubernetes, generative AI Kubernetes Argo container security continuous SQL Server Windocks Tekton Kubeflow Red Hat CI/CD

Kubernetes Security in Your CI/CD Pipeline

Kubernetes security involves implementing security measures and tools and adopting best practices for protecting Kubernetes workloads. Kubernetes is an open source container management platform across public, private and hybrid clouds. Organizations employ ...
CrowdStrike Cryptojacking Linode

CrowdStrike Details Sophisticated Container Cryptojacking Campaign

At the KubeCon + CloudNativeCon North America conference today, CrowdStrike revealed details of a complex cryptojacking campaign targeting vulnerable Docker and Kubernetes infrastructure. The campaign employs a combination of an obscure domain ...
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

5 Laws of Cloud-Native Authorization

In a microservices world, each service needs to verify that a subject (user or machine) has permission to perform an operation on a resource that the service manages. But in an agile ...
Tigera, cloud-native, ulnerability containers

Vulnerability Management: Context From Code to Cloud

Almost all modern cloud-native applications are developed using open source components. And yet, security is not always the top priority for open source developers. While many vulnerabilities can be accidental (e.g., coding ...
KSOC Solo.io access Elastic Kubernetes

Understanding Role-Based Access Control in Kubernetes

“I’m sorry Dave, I’m afraid I can’t do that.” – HAL 9000, 2001: A Space Odyssey This iconic quote from 2001: A Space Odyssey is a great place to start if you ...
IoT Cosmonic Solo.io Isovalent Spectro Cloud Mavenir F5 edge

Spectro Cloud Strengthens Kubernetes Security at the Network Edge

Spectro Cloud has updated its Palette Edge platform with the option to include a distribution of Kubernetes optimized for the network edge. The latest version also adds tamperproof security capabilities for immutable ...
Docker Hub, container images, Ensuring Container Security

Container Images: The Next Software Supply Chain Concern? 

Containers not only provide a mechanism for packaging code in deployable and manageable units, but containers are also a downloadable resource that can speed up infrastructure and app configurations, rapidly creating development ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Veracode Adds Container Support to Security Tool for Developers

Veracode is launching an early access program through which it is adding support for containers to its Continuous Software Security Platform. Brian Roche, chief product officer for Veracode, says this offering will ...