Linkerd, Bouyant, Honeycomb Buoyant Solo.io CNCF Linkerd Istio service mesh

Buoyant Updates Linkerd to Simplify Zero-Trust Security

Buoyant today updated the open source Linkerd service mesh to add support for route-based authorization policies that enforce zero-trust policies within microsegmented Kubernetes environments. In addition, the company is adding support for ...
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Preparing Your Incident Response Team for Container Incidents

The use of containers—and orchestration platforms like Kubernetes—is increasing rapidly around the globe. Analysts predict that by 2023, more than 70% of global organizations will be running more than two containerized applications ...
NSA Guidance

The NSA Wants the Network Locked Down

The NSA’s Kubernetes Hardening Guide offers a lot of advice on implementing the best defense-in-depth approach to your workloads. Part of that guide outlines how Kubernetes users can secure and harden the ...
OpenTelemetry containerization container security ZTNA SASE

Techstrong TV: Making Building Container Applications Simpler

Slim.AI CEO John Amaral explains what it will take to make building container applications simpler. The video and a transcript of the conversation are below. Recorded Voice:         This is Digital Anarchist.   Mike:                           ...
cryptojacking Docker Hub

Aqua Security Finds New Cryptojacking Technique

Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data ...
NSA Guidance

NSA’s Kubernetes Hardening Guidelines and Pod Security

I previously asked (and answered) the question, What Are the NSA K8s Guidelines and Why Should You Care? I suggested that the first step to compliance is to understand your Kubernetes environment ...
Sysdig CEO Charts Containers Course

Techstrong TV: From Facebook to Lacework

Jay Parikh left Facebook and is now a co-CEO at Lacework. How did this come about and what does he hope to accomplish? We catch up with Jay to find out. Video ...
| | cloud, facebook, Lacework
Deepfence cloud-native SQL Server security Kubernetes

Deepfence Expands Scope of Open Source Container Security Platform

Deepfence today announced it has updated its open source ThreatMapper project to add expanded visualizations of attack paths and a scanner based on the YARA tool many security researchers use to identify ...
container Sysdig Volterra

Sysdig Employs AI to Thwart Container Cryptojacking Attacks

At the Black Hat USA 2022 conference, Sysdig today revealed it is adding machine learning algorithms capable of detecting cryptojacking attacks to its cloud service for securing container applications. The algorithms are ...
cloud

Cloud-Native Collision: Security and Cloud Center of Excellence

The migration of enterprise applications and infrastructure to cloud-native architectures is a hot topic—and a very complex one. While we may want to believe digital transformation efforts and cloud migration projects have ...