Chainguard Kubernetes

Chainguard Launches Platform to Enforce Secure Containers

Chainguard today launched a platform that ensures only trusted container images are run on Kubernetes clusters to ensure the integrity of a software supply chain. Chainguard Enforce! is the first product from ...
cloud-native architecture permissions access security

5 Best Practices for Cloud-Native Permissions

Cloud-native/microservices-based products are complex, and so is building access control and managing permissions for these products. And it’s only getting worse with each pull request. Most developers end up building authorization or ...
Canonical VMware DoD AWS Finch CRI-O container containers

Outwitting the New CRI-O Vulnerability

If you’re a CRI-O user, there’s a newly discovered vulnerability that could affect you. It’s called CVE-2022-0811 and it was discovered by CrowdStrike cloud security researchers. While it can’t be exploited by ...
Deepfence cloud-native SQL Server security Kubernetes

Rethinking Anomaly Detection in Cloud-Native Applications

From microservices to multi-cloud, modern application architectures have evolved significantly and created new challenges that are drowning engineers and DevOps teams in data and increasing the number of tools they are being ...
Platform engineering, cloud native, app development, Kubernetes, developer platform Docker cloud-native applications Anchore SBOM metrics full cycle complexity software development

Anchore Extension Can Generate SBOMs for Container Apps

Anchore today added an extension to its software supply chain management platform for container-based applications that can automatically generate and continuously update a software bill of materials (SBOM). Kim Weins, senior vice ...
Catalogic Veem Kasten

Catalogic, Backblaze Reduce K8s Data Protection Costs

Catalogic Software has partnered with Backblaze, a provider of cloud storage services, to reduce the cost of backing up Kubernetes data. Backblaze makes cloud storage available via an S3 application programming interface ...
Docker, Trend Micro, SIEM attack Aqua Security CyberArk pen testing Accurics

Your K8s Environment Was Attacked: What to Do in the First 24 Hours

Cyberattacks—every enterprise’s worst fear. It seems there’s a new headline about a company being compromised and left to deal with the fallout. While everyone from CISOs to DevOps practitioners are focused on ...
IaC Container Vulnerability Scanning Service

When Kubernetes Security Meets IaC Scanning

Security, efficiency and reliability are among the most important concerns in the Kubernetes space. But because containerized workloads are not secure by default, the topic of Kubernetes security continues to be a ...
VMware Adds Capability to Secure Container Runtimes

VMware Adds Capability to Secure Container Runtimes

VMware this week announced it is making available container runtime security capabilities in a VMware Carbon Black Cloud Container Advanced Bundle. Shemer Schwarz, senior director of product management for VMware, says this ...
CloudBees Appgate AWS Fargate

Appgate Extends SDP Reach to Kubernetes

Appgate’s software-defined perimeter (SDP) that controls access to IT platforms now includes support for Kubernetes clusters. Jason Garbis, chief product officer at Appgate, says the Appgate SDP extends a framework for creating ...