container Sysdig Volterra

Sysdig Employs AI to Thwart Container Cryptojacking Attacks

At the Black Hat USA 2022 conference, Sysdig today revealed it is adding machine learning algorithms capable of detecting cryptojacking attacks to its cloud service for securing container applications. The algorithms are ...
cloud

Cloud-Native Collision: Security and Cloud Center of Excellence

The migration of enterprise applications and infrastructure to cloud-native architectures is a hot topic—and a very complex one. While we may want to believe digital transformation efforts and cloud migration projects have ...
Akuity, SUSE, Nutanix, kubernetes, cycle, Mirantis, kubernetes, LoftLabs, vNode, Komodor, configurations, application, clusters, virtual, Red Hat, Kubernetes clusters, Komodor, kubernetes, clusters, kubernetes, IDPs, TLS, certificates, clusters, virtual clusters, Kubernetes, Kubernetes, vCluster CAST AI KBOM DoKC Platform9 Kubernetes

Thwarting Ransomware Attacks in Kubernetes Environments

 In this episode of The View With Vizard, Cloudian CTO Gary Ogasawara explains how to thwart ransomware attacks in Kubernetes environments. The video is above and a transcript of the conversation ...
OpenTelemetry containerization container security ZTNA SASE

Securing Containers With Zero-Trust Tools

As container environments grow in complexity, container security requires a different security approach. Container security must consider everything from the applications running in containers to the infrastructure on which those containers run.  ...
Using Kubernetes to Secure Data

Using Kubernetes to Secure Data

Data loss and ransomware are two of the biggest threats to data security today, especially as malicious actors turn their attention to the cloud. Even with security perimeters in place, bad actors ...
security compliance, NSA Kubernetes stateful kubernetes k8s Kublr

What Are the NSA K8s Guidelines and Why Should You Care?

The NSA released its Kubernetes Hardening Guidelines almost a year ago and made updates to it this March. The purpose of the document is to provide an overview of what Kubernetes users ...
Trend Micro Tightens Container Security Integration in Cloud Platform

Trend Micro Tightens Container Security Integration in Cloud Platform

Trend Micro today extended its Trend Micro Cloud One platform to more tightly integrate its container security offering. Mike Milner, vice president of cloud technology for Trend Micro, said the latest edition ...
Securing Containers At Scale

Securing Containers At Scale

While containers deliver speed and agility to software development and deployment, they also add a layer of complexity that invites unprecedented security concerns, including how to manage vulnerabilities in a dynamic container ...
container security sysdig snyk container Mirantis Aqua Security GitHub

5 Tricky Container Security Challenges

Containerized environments can be relatively complex to secure, particularly for enterprise teams used to more traditional network security processes and strategies. There was initial optimism that containerized infrastructure would actually be more ...
Apiiro Extends Container Security Platform to Runtime Environments

Apiiro Extends Container Security Platform to Runtime Environments

Apiiro has extended the reach of its cloud-native application security platform to enable it to analyze data from runtime environments. That capability provides developers with more context when it comes to remediating ...