DevOps World 2022: Cloud-Native Will Force CI/CD Issue

DevOps World 2022: Cloud-Native Will Force CI/CD Issue

It may have taken longer than anyone initially expected, but the cloud-native era for building and deploying applications has finally arrived. Nearly every major application development initiative being launched today is based ...
NSA Guidance

NSA Security Best Practices for Kubernetes

In this series, I’ve outlined why every organization should care about the NSA’s Kubernetes Hardening Guidelines and examined different areas of the guidelines. What you may suspect is that most of the ...
ingress Sysdig SUSE Siloscape security-as-code Docker

Sysdig Simplifies Container Security Remediation

Sysdig today announced it is adding a guided remediation tool along with a checklist to help organizations better prioritize their container remediation efforts. Alba Ferri, senior manager for product marketing at Sysdig, ...
state, stateless, kubernetes, scanning, cloudsmith, stateless ephemeral stateful security Kubernetes unikernel Sumo Logic

Containing Container Security Threats

As cloud adoption and digital transformation increase, more sensitive data from applications is being stored in containers. This is why effective container security controls to securely manage application connectivity are an absolute ...
Ingress Kubescape Kubernetes Docker

The Way Forward for K8s Security: Eliminate Standing Privileges

If you have worked in cloud computing, DevOps or related fields in recent years, you’ve no doubt come across Kubernetes. One of the earliest and most popular open source container orchestration systems, ...
Kubernetes

NSA Wants Strong Kubernetes Authentication and Authorization 

When I want to get into my phone, I use a passcode or face ID to authenticate. When I want to get into my home, I use a key because no person ...
Slim.AI Making Containers More Secure

Slim.AI Integrates Vulnerability Scanning in Container Platform

Slim.AI is expanding the security capabilities in its namesake container deployment platform and making it simpler to discover vulnerabilities in containers. In addition, Slim.AI is extending the platform’s ability to harden containers ...
To Protect Cloud-Native APIs, Avoid Overly Permissive States

To Protect Cloud-Native APIs, Avoid Overly Permissive States

APIs are now foundational to how modern applications are built: Using microservices and containers and running on platforms like Kubernetes. They’re the standard mechanism to integrate internal components or expose functionality to ...
kubernetes, network, logistics, security, Traefik Tigera container security Calico Red Hat Dynatrace

Tigera Update Makes Securing Containers Simpler

Tigera today announced a range of additional capabilities within its cloud-native application protection platform to secure container applications before and after they are deployed. Utpal Bhatt, chief marketing officer for Tigera, says ...
containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

Containers are Temporary – The Data Inside Is Not

Containers are maturing and becoming essential for organizations pursuing an application modernization strategy. With all their code consolidated into a single package, containers can be spun up quickly and seamlessly moved from ...