Cloud-Native Security

Bad Actors Exploiting Docker Remote API Servers in Attacks
Researchers from cybersecurity vendor Trend Micro are urging developers to secure and monitor their Docker remote API servers after attacks by threat actors targeting the systems to install a Linux malware and ...

How to Secure Cloud-Native Architectures Without Sacrificing Agility
The real question isn’t just about what risks you are missing, but how to secure your infrastructure without losing the agility offered by cloud-native architectures. ...

JFrog Adds Runtime Platform to Secure Cloud-Native Apps Running on Kubernetes
JFrog today at its swampUP 2024 conference revealed it has added an ability to automate real-time DevSecOps workflows spanning source code to binaries deployed in Kubernetes environments ...

Azure Flaw Highlights Need to Secure Kubernetes Cloud Clusters
A security flaw found by Mandiant in Microsoft's AKS service would have let attackers escalate privileges and steal data ...

How Kubernetes and Containers Will Protect — and be Protected by — AI
As companies expand their use of predictive and generative AI in building new applications and services, the security of the underlying data becomes increasingly important — and challenging. Container-focused technologies — including ...

Machines and Workloads Need Identities Too — Not Just Humans
If machine and workload identities are not being managed consistently across environments, they can pose an increased risk of compromise to your organization. ...

Calico Cluster Mesh Simplifies Microservices Integration
Calico Cluster Mesh delivers the benefits of a service mesh without the added complexity and latency of a traditional service mesh solution ...

Isovalent Strengthens Cloud Native Security via Tetragon Enterprise Update
The goal is to provide an important cybersecurity piece to the cloud-native computing puzzle ...

JFrog Reveals Docker Hub Compromise Spanning Millions of Repositories
Malware attacks against millions of Docker Hub repositories have been underway since 2021. Assume all the content you host on a publicly accessible repository might be compromised ...

Red Hat Adds Developer Tools to Extend DevSecOps Reach
Red Hat added three new developer tools, expanding its DevSecOps portfolio for building secure cloud-native applications ...