Cloud-Native Security
To Protect Cloud-Native APIs, Avoid Overly Permissive States
APIs are now foundational to how modern applications are built: Using microservices and containers and running on platforms like Kubernetes. They’re the standard mechanism to integrate internal components or expose functionality to ...
Tigera Update Makes Securing Containers Simpler
Tigera today announced a range of additional capabilities within its cloud-native application protection platform to secure container applications before and after they are deployed. Utpal Bhatt, chief marketing officer for Tigera, says ...
Containers are Temporary – The Data Inside Is Not
Containers are maturing and becoming essential for organizations pursuing an application modernization strategy. With all their code consolidated into a single package, containers can be spun up quickly and seamlessly moved from ...
Kubernetes 1.25 Update Focuses on Security and Storage
This week, the Technical Oversight Committee (TOC) for Kubernetes released a Combiner update to the cloud-native platform that adds more than 40 enhancements. The bulk of the enhancements delivered in Kubernetes 1.25 ...
Optimizing Developer Impact on K8s Security
Kubernetes just passed its eighth birthday (hope you didn’t forget to send a card). In that time, the DevSecOps movement has decisively shifted security left. The evolution continues to add work to ...
Buoyant Updates Linkerd to Simplify Zero-Trust Security
Buoyant today updated the open source Linkerd service mesh to add support for route-based authorization policies that enforce zero-trust policies within microsegmented Kubernetes environments. In addition, the company is adding support for ...
Preparing Your Incident Response Team for Container Incidents
The use of containers—and orchestration platforms like Kubernetes—is increasing rapidly around the globe. Analysts predict that by 2023, more than 70% of global organizations will be running more than two containerized applications ...
The NSA Wants the Network Locked Down
The NSA’s Kubernetes Hardening Guide offers a lot of advice on implementing the best defense-in-depth approach to your workloads. Part of that guide outlines how Kubernetes users can secure and harden the ...
Techstrong TV: Making Building Container Applications Simpler
Slim.AI CEO John Amaral explains what it will take to make building container applications simpler. The video and a transcript of the conversation are below. Recorded Voice: This is Digital Anarchist. Mike: ...
Aqua Security Finds New Cryptojacking Technique
Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data ...

