Kubernetes, serverless Kubernetes backup and recovery

Tips For Stateful Kubernetes Data Backup And Recovery

All systems need a plan for data backup and recovery. It doesn’t matter if your application’s running on the cloud, on-premises or in a refrigerator at the edge of a network—it will ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

4 CNCF Projects For Key Management

The nuances of cloud-native architecture necessitate some new approaches to security. Not only are container-based microservices inherently distributed, but there is a rising number of dependencies within the software supply chain. As ...
security IaC containers secure

Container Threats in the Cloud: What Enterprises Need to Know

With the changing cybersecurity landscape, enterprises need to incorporate stringent security mechanisms to protect their in-house infrastructure and cloud-native applications—those built using microservices; that are container-based and running on platforms such as ...
Lacework Red Hat Aqua Security

The State of K8s Software Supply Chain Attacks

Securing the software supply chain is in the zeitgeist, and for a good reason. Software supply chain attacks grew by more than 300% from 2020 to 2021. Supply chain attacks continue to ...
endpoint Loft Labs OneSphere to Kubernetes on VMware

Endpoint Protection for Cloud-Native Workloads

Endpoint protection is the practice of deploying security systems on endpoints such as servers, workstations and mobile devices used to connect to corporate networks. The purpose of these systems is to detect, ...
Kubernetes auth spot node check

Auth In the Age of Kubernetes

Kubernetes! It seems like the whole world is excited about this new software deployment platform. And why not? From the docs, we know that “Kubernetes is a portable, extensible, open source platform ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Understanding Container Security – Part Two: Security Recommendations

In part one of this series, we discussed the rise in container security threats. As containers have gained in popularity, they’ve also provided an expanding attack surface. We explored why so many ...
container security

Understanding Container Security – Part One: Security Gaps

In our recent interview with Aqua Security’s Rory McCune about CRI-O vulnerability CVE-2022-0811, he mentioned that he’d seen a sharp rise in container cybersecurity threats this year. His experience isn’t unusual; last ...
Fairwinds culture enablement Kubernetes service ownership

Fairwinds Melds Kubernetes Security and Governance

Fairwinds has updated its Kubernetes governance platform to include the ability to automatically scan YAML files and Helm charts stored in GitHub repositories. Announced at the recent KubeCon + CloudNativeCon Europe 2022 ...
containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

Lacework Dives Deeper Into Kubernetes Security

At the KubeCon + CloudNativeCon Europe 2022 conference this week, Lacework extended the reach of its security platform deeper into Kubernetes clusters. The latest update to Lacework’s Polygraph Data Platform adds support ...