container security sysdig snyk container Mirantis Aqua Security GitHub

5 Tricky Container Security Challenges

Containerized environments can be relatively complex to secure, particularly for enterprise teams used to more traditional network security processes and strategies. There was initial optimism that containerized infrastructure would actually be more ...
Apiiro Extends Container Security Platform to Runtime Environments

Apiiro Extends Container Security Platform to Runtime Environments

Apiiro has extended the reach of its cloud-native application security platform to enable it to analyze data from runtime environments. That capability provides developers with more context when it comes to remediating ...
Sysdig's Falco Container Security Runtime

Sysdig Adds Ability to Make Container Runtimes Immutable

Sysdig today added a Drift Control capability to its container security platform that makes it possible to lock down runtime environments. Daniella Pontes, senior manager for product marketing at Sysdig, says IT ...
Slim.AI Docker OpsRamp Extends AIOps Reach to Kubernetes

Slim.AI Integrates Container Automation Platform With DevOps Workflows

Slim.AI, via an early access program, has made available a version of its automated container security remediation platform that can now be more easily integrated within a DevOps workflow. John Amaral, Slim.AI ...
Kubernetes, serverless Kubernetes backup and recovery

Tips For Stateful Kubernetes Data Backup And Recovery

All systems need a plan for data backup and recovery. It doesn’t matter if your application’s running on the cloud, on-premises or in a refrigerator at the edge of a network—it will ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

4 CNCF Projects For Key Management

The nuances of cloud-native architecture necessitate some new approaches to security. Not only are container-based microservices inherently distributed, but there is a rising number of dependencies within the software supply chain. As ...
security IaC containers secure

Container Threats in the Cloud: What Enterprises Need to Know

With the changing cybersecurity landscape, enterprises need to incorporate stringent security mechanisms to protect their in-house infrastructure and cloud-native applications—those built using microservices; that are container-based and running on platforms such as ...
Lacework Red Hat Aqua Security

The State of K8s Software Supply Chain Attacks

Securing the software supply chain is in the zeitgeist, and for a good reason. Software supply chain attacks grew by more than 300% from 2020 to 2021. Supply chain attacks continue to ...
endpoint Loft Labs OneSphere to Kubernetes on VMware

Endpoint Protection for Cloud-Native Workloads

Endpoint protection is the practice of deploying security systems on endpoints such as servers, workstations and mobile devices used to connect to corporate networks. The purpose of these systems is to detect, ...
Kubernetes auth spot node check

Auth In the Age of Kubernetes

Kubernetes! It seems like the whole world is excited about this new software deployment platform. And why not? From the docs, we know that “Kubernetes is a portable, extensible, open source platform ...