Survey Surfaces Cloud-Native Stress Points

Survey Surfaces Cloud-Native Stress Points

A survey from Platform9, a managed Kubernetes service provider, finds that even as organizations embrace cloud-native technologies, concerns over security, management, high availability and observability remain. The survey, which polled more than ...
Kubernetes misconfigurations Nestybox

Kubernetes Misconfigurations are Your Worst Enemy

Although misconfigurations happen all the time, they are now regarded as one of the biggest and most challenging concepts in the world of Kubernetes. Security, efficiency and reliability are the three high-level ...
container security sysdig snyk container Mirantis Aqua Security GitHub

Sysdig Allies With Snyk to Improve Container Security

Sysdig and Snyk are integrating their respective security technologies to enable organizations to better secure the entire container life cycle. Eric Carter, director of product marketing for Sysdig, says the integration of ...
posture, security posture management, KSPM, Kubernetes KSPM cloud-native Fugue security

Cloud-Native Security Posture Management

Lightspin CEO Vladi Sandler talks with Mike Vizard about how cloud security posture management (CSPM) is challenging in cloud-native computing environments. The video is below followed by a transcript of the conversation ...
Tigera container platform

Tigera Adds Scanning Engine to CNAPP for Kubernetes

Tigera today announced the addition of a scanning engine to its Calico Cloud service that will continuously assess images for vulnerabilities and misconfigurations in addition to managing interactions among microservices running on ...
Catalogic Software Secures Data Protection for Kubernetes

Catalogic Software Secures Data Protection for Kubernetes

Catalogic Software today announced general availability of an update to its CloudCasa data protection service that adds the ability to scan for misconfigurations in both Kubernetes environments and cloud services provided by ...
Octopus deploy Red Hat containers Kyndryl Node.js Open Policy Agent OPA cloud-native

Open Policy Agent 101: A Beginner’s Guide

More than 90% of applications will be cloud-native by 2023. As organizations transition from monolithic, on-premises environments to dynamic cloud-based ones, ensuring access control becomes more critical—and complex. That’s why I co-created ...
container security

Linux Kernel Bug Allows Kubernetes Container Escape

Hackers could exploit a Linux kernel bug to escape Kubernetes containers and access critical resources; however, the threat is minimized as any attacker needs to have the specific Linux capability CAP_SYS_ADMIN. The ...
cloud-native software policy Styra Shifts Kubernetes Policy Management Left

The State of Policy Management In Kubernetes

Kubernetes is enabling powerful container orchestration capabilities for many organizations. But with this power comes great responsibility. Securing Kubernetes access is crucial to meet compliance requirements and avoid data leaks. And a ...
OpenTofu, infrastructure IaC Kubernetes Leveraging Ephemeral Infrastructure Effectively

Securing Kubernetes at the Infrastructure Level

Infrastructure security is important to get right so that attacks can be prevented—or, in the case of a successful attack, damage can be minimized. It is especially important in a Kubernetes environment ...