Cloud-Native Security

SigstoreCon Supply Chain Day 2024: Celebrating the Impact of Sigstore on Digital Signing and Supply Chain Security
As we approach SigstoreCon at KubeCon + CloudNativeCon, where experts will share their insights, let's reflect on Sigstore and its impact ...

Unlocking the Full Potential of Container Vulnerability Scans
Given the complex dependencies of container images, which can rely on other container images with potential vulnerabilities, it is crucial for developers to proactively identify and address container security vulnerabilities before deployment ...

Bad Actors Exploiting Docker Remote API Servers in Attacks
Researchers from cybersecurity vendor Trend Micro are urging developers to secure and monitor their Docker remote API servers after attacks by threat actors targeting the systems to install a Linux malware and ...

How to Secure Cloud-Native Architectures Without Sacrificing Agility
The real question isn’t just about what risks you are missing, but how to secure your infrastructure without losing the agility offered by cloud-native architectures. ...

JFrog Adds Runtime Platform to Secure Cloud-Native Apps Running on Kubernetes
JFrog today at its swampUP 2024 conference revealed it has added an ability to automate real-time DevSecOps workflows spanning source code to binaries deployed in Kubernetes environments ...

Azure Flaw Highlights Need to Secure Kubernetes Cloud Clusters
A security flaw found by Mandiant in Microsoft's AKS service would have let attackers escalate privileges and steal data ...

How Kubernetes and Containers Will Protect — and be Protected by — AI
As companies expand their use of predictive and generative AI in building new applications and services, the security of the underlying data becomes increasingly important — and challenging. Container-focused technologies — including ...

Machines and Workloads Need Identities Too — Not Just Humans
If machine and workload identities are not being managed consistently across environments, they can pose an increased risk of compromise to your organization. ...

Calico Cluster Mesh Simplifies Microservices Integration
Calico Cluster Mesh delivers the benefits of a service mesh without the added complexity and latency of a traditional service mesh solution ...

Isovalent Strengthens Cloud Native Security via Tetragon Enterprise Update
The goal is to provide an important cybersecurity piece to the cloud-native computing puzzle ...