HUB Security Adds Docker Security to Encryption Platform

HUB Security Adds Docker Security to Encryption Platform

HUB Security has added a Docker Digital Twin platform that secures, authenticates and verifies traffic created by Docker containers running on an encrypted hardware platform. Noam Dror, vice president for worldwide solution ...
cloud-native PCI Compliance in a Container Environment

Auditing and Compliance in the Cloud-Native Era

Once upon a time, auditing and compliance were relatively straightforward—albeit tedious—tasks. Fast-forward to the cloud-native age in which we currently live and you’ll find the auditing and compliance landscape has changed dramatically ...
The Basics of Serverless User Authentication

The Basics of Serverless User Authentication

Serverless is growing in popularity, with Amazon Lambda dominating the industry as a serverless runtime. While serverless has many advantages, it also raises a variety of challenges and forces developers to do ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Best of 2021 – 7 Principles of DevSecOps With Kubernetes

As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the eighteenth in our series of the Best of 2021. In ...
Kubernetes, serverless Kubernetes backup and recovery

Best of 2021 – How to Implement Disaster Recovery for Kubernetes

As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the thirteenth in our series of the Best of 2021. Conventional ...
Best of 2021 - Siloscape: The Dark Side of Kubernetes

Best of 2021 – Siloscape: The Dark Side of Kubernetes

As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the second in our series of the Best of 2021. It ...
Containers in the Cloud Next on Cybercriminals’ Radar

Containers in the Cloud Next on Cybercriminals’ Radar

Over the past couple of years, containers have solved many complex issues related to the compatibility and portability of deployments. But that means they contain sensitive information that can attract the attention ...
containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

Zero-Trust for Kubernetes

Zero-trust is a new security paradigm that is adopted by the world’s biggest and most technically advanced organizations, including Google, Microsoft, and Amazon Web Services (AWS). It is being applied to virtually ...
cloud-native PCI Compliance in a Container Environment

Going Cloud-Native in Highly Regulated Industries

IT divisions working within highly-regulated industries are under intense scrutiny. These environments must carefully deal with sensitive data to meet compliances and corporate standards. This pressure often results in vigorous tooling assessments ...
Chainguard cloud-native Tigera Kubernetes supply chain

Tigera Expands Reach of K8s Security and Management Platforms

Tigera today announced that it is adding real-time intrusion detection capabilities with the latest release of Calico Cloud and Calico Enterprise platforms that enable secure networking between Kubernetes clusters. In addition, Tigera ...