Cloud-Native Security
Sysdig Report Reveals True Cost of Container Security Breaches
A Sysdig report published today finds that for every dollar cybercriminals generate through a cryptomining attack against a cloud container environment, victims end up paying a $53 bill. As a result, an ...
Docker, Inc. to Integrate Free SBOM Generation Tool
Docker, Inc. plans to embed the ability to dynamically generate a software bill of materials (SBOM) using the Docker Build command that developers use to build Docker images from a Dockerfile. Company ...
DevOps World 2022: Cloud-Native Will Force CI/CD Issue
It may have taken longer than anyone initially expected, but the cloud-native era for building and deploying applications has finally arrived. Nearly every major application development initiative being launched today is based ...
NSA Security Best Practices for Kubernetes
In this series, I’ve outlined why every organization should care about the NSA’s Kubernetes Hardening Guidelines and examined different areas of the guidelines. What you may suspect is that most of the ...
Sysdig Simplifies Container Security Remediation
Sysdig today announced it is adding a guided remediation tool along with a checklist to help organizations better prioritize their container remediation efforts. Alba Ferri, senior manager for product marketing at Sysdig, ...
Containing Container Security Threats
As cloud adoption and digital transformation increase, more sensitive data from applications is being stored in containers. This is why effective container security controls to securely manage application connectivity are an absolute ...
The Way Forward for K8s Security: Eliminate Standing Privileges
If you have worked in cloud computing, DevOps or related fields in recent years, you’ve no doubt come across Kubernetes. One of the earliest and most popular open source container orchestration systems, ...
NSA Wants Strong Kubernetes Authentication and Authorization
When I want to get into my phone, I use a passcode or face ID to authenticate. When I want to get into my home, I use a key because no person ...
Slim.AI Integrates Vulnerability Scanning in Container Platform
Slim.AI is expanding the security capabilities in its namesake container deployment platform and making it simpler to discover vulnerabilities in containers. In addition, Slim.AI is extending the platform’s ability to harden containers ...
To Protect Cloud-Native APIs, Avoid Overly Permissive States
APIs are now foundational to how modern applications are built: Using microservices and containers and running on platforms like Kubernetes. They’re the standard mechanism to integrate internal components or expose functionality to ...

