Catalogic Software Extends CloudCasa Support to Kubernetes

Catalogic Software Extends CloudCasa Support to Kubernetes

Catalogic Software today announced it has made available support for backing up Kubernetes persistent volumes to cloud storage, including Amazon Elastic Block Storage (EBS) persistent volumes, to its CloudCasa software-as-a-service (SaaS) platform ...
firewall, aviatrix, cloud native security, kubernetes, hardening Aqua Security

Hardening Kubernetes Beyond NSA, CISA Guidance

Information security and data privacy in the cloud has an abysmal track record. Hardly a week goes by without some major cloud-powered security-related incident making the news. We, as a community, need ...
container how Containers

Why is Standardizing on Container Best Practices so Hard?

If you are the technology leader of your organization, you are likely driving the shift to cloud-native or even multi-cloud architectures to capitalize on the scalability, elasticity and agility it offers. And ...
Veeam backup and recovery

Prioritizing Backup as Container Use Rises

According to a recent report from Evaluator Group, the Spring 2021 Hybrid Cloud Study, 29% of enterprises are using Kubernetes in a production environment today with another 40% testing Kubernetes with plans ...
The Four Cs of Cloud-Native Security

The Four Cs of Cloud-Native Security

Open source container orchestration systems like Kubernetes have gone mainstream. Businesses are moving toward cloud-native technologies, building applications in the cloud to maximize their scalability. While a recent survey indicated cloud-native adoption ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Is Your Kubernetes Network Security Strategy Solid?

The aftermath of a security incident is the worst time to realize that your Kubernetes protections weren’t good enough. When thorough Kubernetes security measures are in place, potential threats are detected and ...
Palo Alto Networks Details Exploit of Microsoft ACI Service

Palo Alto Networks Details Exploit of Microsoft ACI Service

The Unit 42 research arm of Palo Alto Networks has revealed how it discovered vulnerabilities in the multitenant Kubernetes clusters hosted on the Azure Container Instances (ACI) cloud service provided by Microsoft ...
Docker, secrets, gitguardian Thycotic Kubernetes secrets

GitGuardian Investigation Finds Secrets in Docker Images

A report published by GitGuardian, a provider of security tools for scanning Git repositories, finds that out of 2,000 images pushed to Docker Hub, a total of 7% contained at least one ...
ZTA trust authentication service mesh

Using Service Mesh to Enable Zero-Trust Architecture (ZTA)

Cybersecurity is not only a threat to private enterprises, it’s a national government priority, too. A 2021 presidential executive order names zero-trust architecture (ZTA) as part of new cybersecurity initiatives across government ...
Lacework Red Hat Aqua Security

Lacework Labs Finds Backdoors in Container Images

Cloud security platform provider Lacework this week published a report that reveals cybercriminals are now creating backdoors in legitimate container images. Lacework Labs reports it has discovered that a threat actor, dubbed ...