The Basics of Serverless User Authentication

The Basics of Serverless User Authentication

Serverless is growing in popularity, with Amazon Lambda dominating the industry as a serverless runtime. While serverless has many advantages, it also raises a variety of challenges and forces developers to do ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Best of 2021 – 7 Principles of DevSecOps With Kubernetes

As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the eighteenth in our series of the Best of 2021. In ...
Kubernetes, serverless Kubernetes backup and recovery

Best of 2021 – How to Implement Disaster Recovery for Kubernetes

As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the thirteenth in our series of the Best of 2021. Conventional ...
Best of 2021 - Siloscape: The Dark Side of Kubernetes

Best of 2021 – Siloscape: The Dark Side of Kubernetes

As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the second in our series of the Best of 2021. It ...
CloudCasa Sysdig containers CommVault

Containers in the Cloud Next on Cybercriminals’ Radar

Over the past couple of years, containers have solved many complex issues related to the compatibility and portability of deployments. But that means they contain sensitive information that can attract the attention ...
containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

Zero-Trust for Kubernetes

Zero-trust is a new security paradigm that is adopted by the world’s biggest and most technically advanced organizations, including Google, Microsoft, and Amazon Web Services (AWS). It is being applied to virtually ...
cloud-native PCI Compliance in a Container Environment

Going Cloud-Native in Highly Regulated Industries

IT divisions working within highly-regulated industries are under intense scrutiny. These environments must carefully deal with sensitive data to meet compliances and corporate standards. This pressure often results in vigorous tooling assessments ...
Chainguard cloud-native Tigera Kubernetes supply chain

Tigera Expands Reach of K8s Security and Management Platforms

Tigera today announced that it is adding real-time intrusion detection capabilities with the latest release of Calico Cloud and Calico Enterprise platforms that enable secure networking between Kubernetes clusters. In addition, Tigera ...
kubernetes, network, logistics, security, Traefik Tigera container security Calico Red Hat Dynatrace

Tigera Integrates Calico Cloud for Amazon EKS with AWS Control Tower

Tigera has integrated its Calico Cloud networking and security platform with the governance management framework that Amazon Web Services (AWS) makes available to IT teams that have multiple accounts that need to ...
Kubernetes security FusionAuth secure container images

Adding FusionAuth to Kubernetes

FusionAuth is a platform for adding authentication and authorization to your apps. It’s practically a plug-and-play platform, allowing you to focus on your own app development and leave the security aspects to ...