Cloud-Native Security

Containers in the Cloud Next on Cybercriminals’ Radar
Over the past couple of years, containers have solved many complex issues related to the compatibility and portability of deployments. But that means they contain sensitive information that can attract the attention ...

Zero-Trust for Kubernetes
Zero-trust is a new security paradigm that is adopted by the world’s biggest and most technically advanced organizations, including Google, Microsoft, and Amazon Web Services (AWS). It is being applied to virtually ...

Going Cloud-Native in Highly Regulated Industries
IT divisions working within highly-regulated industries are under intense scrutiny. These environments must carefully deal with sensitive data to meet compliances and corporate standards. This pressure often results in vigorous tooling assessments ...

Tigera Expands Reach of K8s Security and Management Platforms
Tigera today announced that it is adding real-time intrusion detection capabilities with the latest release of Calico Cloud and Calico Enterprise platforms that enable secure networking between Kubernetes clusters. In addition, Tigera ...

Tigera Integrates Calico Cloud for Amazon EKS with AWS Control Tower
Tigera has integrated its Calico Cloud networking and security platform with the governance management framework that Amazon Web Services (AWS) makes available to IT teams that have multiple accounts that need to ...

Adding FusionAuth to Kubernetes
FusionAuth is a platform for adding authentication and authorization to your apps. It’s practically a plug-and-play platform, allowing you to focus on your own app development and leave the security aspects to ...

Why Kubernetes Service Ownership is the Answer to Container Security
Full-service ownership is a hot topic right now in Kubernetes, as it revolves around the need for better container security. At the center of the discussion is the question of how this ...

Stateful Container High Availability: Good, Better, Best
A 2020 McKinsey global study found that, as a result of the COVID-19 pandemic, companies have been pushed “over the technology tipping point.” The research found that as digital adoption has ramped ...

DevSecOps Essentials for Containers
DevSecOps has emerged as the preferred and necessary approach to secure modern applications by ensuring security practices are seamlessly integrated into the software development and delivery process in an automated fashion. While ...

Protecting Kubernetes from Ransomware Threats
A historic number of companies worldwide are flocking to the cloud as they adapt to this long-term remote work movement. Many are also adopting Kubernetes as their default container orchestration tool. Its ...