Cloud-Native Security

Survey Surfaces Cloud-Native Stress Points
A survey from Platform9, a managed Kubernetes service provider, finds that even as organizations embrace cloud-native technologies, concerns over security, management, high availability and observability remain. The survey, which polled more than ...

Kubernetes Misconfigurations are Your Worst Enemy
Although misconfigurations happen all the time, they are now regarded as one of the biggest and most challenging concepts in the world of Kubernetes. Security, efficiency and reliability are the three high-level ...

Sysdig Allies With Snyk to Improve Container Security
Sysdig and Snyk are integrating their respective security technologies to enable organizations to better secure the entire container life cycle. Eric Carter, director of product marketing for Sysdig, says the integration of ...

Cloud-Native Security Posture Management
Lightspin CEO Vladi Sandler talks with Mike Vizard about how cloud security posture management (CSPM) is challenging in cloud-native computing environments. The video is below followed by a transcript of the conversation ...

Tigera Adds Scanning Engine to CNAPP for Kubernetes
Tigera today announced the addition of a scanning engine to its Calico Cloud service that will continuously assess images for vulnerabilities and misconfigurations in addition to managing interactions among microservices running on ...

Catalogic Software Secures Data Protection for Kubernetes
Catalogic Software today announced general availability of an update to its CloudCasa data protection service that adds the ability to scan for misconfigurations in both Kubernetes environments and cloud services provided by ...

Open Policy Agent 101: A Beginner’s Guide
More than 90% of applications will be cloud-native by 2023. As organizations transition from monolithic, on-premises environments to dynamic cloud-based ones, ensuring access control becomes more critical—and complex. That’s why I co-created ...

Linux Kernel Bug Allows Kubernetes Container Escape
Hackers could exploit a Linux kernel bug to escape Kubernetes containers and access critical resources; however, the threat is minimized as any attacker needs to have the specific Linux capability CAP_SYS_ADMIN. The ...

The State of Policy Management In Kubernetes
Kubernetes is enabling powerful container orchestration capabilities for many organizations. But with this power comes great responsibility. Securing Kubernetes access is crucial to meet compliance requirements and avoid data leaks. And a ...

Securing Kubernetes at the Infrastructure Level
Infrastructure security is important to get right so that attacks can be prevented—or, in the case of a successful attack, damage can be minimized. It is especially important in a Kubernetes environment ...