Cloud-Native Security
HUB Security Adds Docker Security to Encryption Platform
HUB Security has added a Docker Digital Twin platform that secures, authenticates and verifies traffic created by Docker containers running on an encrypted hardware platform. Noam Dror, vice president for worldwide solution ...
Auditing and Compliance in the Cloud-Native Era
Once upon a time, auditing and compliance were relatively straightforward—albeit tedious—tasks. Fast-forward to the cloud-native age in which we currently live and you’ll find the auditing and compliance landscape has changed dramatically ...
The Basics of Serverless User Authentication
Serverless is growing in popularity, with Amazon Lambda dominating the industry as a serverless runtime. While serverless has many advantages, it also raises a variety of challenges and forces developers to do ...
Best of 2021 – 7 Principles of DevSecOps With Kubernetes
As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the eighteenth in our series of the Best of 2021. In ...
Best of 2021 – How to Implement Disaster Recovery for Kubernetes
As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the thirteenth in our series of the Best of 2021. Conventional ...
Best of 2021 – Siloscape: The Dark Side of Kubernetes
As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the second in our series of the Best of 2021. It ...
Containers in the Cloud Next on Cybercriminals’ Radar
Over the past couple of years, containers have solved many complex issues related to the compatibility and portability of deployments. But that means they contain sensitive information that can attract the attention ...
Zero-Trust for Kubernetes
Zero-trust is a new security paradigm that is adopted by the world’s biggest and most technically advanced organizations, including Google, Microsoft, and Amazon Web Services (AWS). It is being applied to virtually ...
Going Cloud-Native in Highly Regulated Industries
IT divisions working within highly-regulated industries are under intense scrutiny. These environments must carefully deal with sensitive data to meet compliances and corporate standards. This pressure often results in vigorous tooling assessments ...
Tigera Expands Reach of K8s Security and Management Platforms
Tigera today announced that it is adding real-time intrusion detection capabilities with the latest release of Calico Cloud and Calico Enterprise platforms that enable secure networking between Kubernetes clusters. In addition, Tigera ...

