Cloud-Native Security

Sysdig Employs AI to Thwart Container Cryptojacking Attacks
At the Black Hat USA 2022 conference, Sysdig today revealed it is adding machine learning algorithms capable of detecting cryptojacking attacks to its cloud service for securing container applications. The algorithms are ...

Cloud-Native Collision: Security and Cloud Center of Excellence
The migration of enterprise applications and infrastructure to cloud-native architectures is a hot topic—and a very complex one. While we may want to believe digital transformation efforts and cloud migration projects have ...

Thwarting Ransomware Attacks in Kubernetes Environments
In this episode of The View With Vizard, Cloudian CTO Gary Ogasawara explains how to thwart ransomware attacks in Kubernetes environments. The video is above and a transcript of the conversation ...

Securing Containers With Zero-Trust Tools
As container environments grow in complexity, container security requires a different security approach. Container security must consider everything from the applications running in containers to the infrastructure on which those containers run. ...

Using Kubernetes to Secure Data
Data loss and ransomware are two of the biggest threats to data security today, especially as malicious actors turn their attention to the cloud. Even with security perimeters in place, bad actors ...

What Are the NSA K8s Guidelines and Why Should You Care?
The NSA released its Kubernetes Hardening Guidelines almost a year ago and made updates to it this March. The purpose of the document is to provide an overview of what Kubernetes users ...

Trend Micro Tightens Container Security Integration in Cloud Platform
Trend Micro today extended its Trend Micro Cloud One platform to more tightly integrate its container security offering. Mike Milner, vice president of cloud technology for Trend Micro, said the latest edition ...

Securing Containers At Scale
While containers deliver speed and agility to software development and deployment, they also add a layer of complexity that invites unprecedented security concerns, including how to manage vulnerabilities in a dynamic container ...

5 Tricky Container Security Challenges
Containerized environments can be relatively complex to secure, particularly for enterprise teams used to more traditional network security processes and strategies. There was initial optimism that containerized infrastructure would actually be more ...

Apiiro Extends Container Security Platform to Runtime Environments
Apiiro has extended the reach of its cloud-native application security platform to enable it to analyze data from runtime environments. That capability provides developers with more context when it comes to remediating ...