Cloud-Native Security

Catalogic Software Extends CloudCasa Support to Kubernetes
Catalogic Software today announced it has made available support for backing up Kubernetes persistent volumes to cloud storage, including Amazon Elastic Block Storage (EBS) persistent volumes, to its CloudCasa software-as-a-service (SaaS) platform ...

Hardening Kubernetes Beyond NSA, CISA Guidance
Information security and data privacy in the cloud has an abysmal track record. Hardly a week goes by without some major cloud-powered security-related incident making the news. We, as a community, need ...

Why is Standardizing on Container Best Practices so Hard?
If you are the technology leader of your organization, you are likely driving the shift to cloud-native or even multi-cloud architectures to capitalize on the scalability, elasticity and agility it offers. And ...

Prioritizing Backup as Container Use Rises
According to a recent report from Evaluator Group, the Spring 2021 Hybrid Cloud Study, 29% of enterprises are using Kubernetes in a production environment today with another 40% testing Kubernetes with plans ...

The Four Cs of Cloud-Native Security
Open source container orchestration systems like Kubernetes have gone mainstream. Businesses are moving toward cloud-native technologies, building applications in the cloud to maximize their scalability. While a recent survey indicated cloud-native adoption ...

Is Your Kubernetes Network Security Strategy Solid?
The aftermath of a security incident is the worst time to realize that your Kubernetes protections weren’t good enough. When thorough Kubernetes security measures are in place, potential threats are detected and ...

Palo Alto Networks Details Exploit of Microsoft ACI Service
The Unit 42 research arm of Palo Alto Networks has revealed how it discovered vulnerabilities in the multitenant Kubernetes clusters hosted on the Azure Container Instances (ACI) cloud service provided by Microsoft ...

GitGuardian Investigation Finds Secrets in Docker Images
A report published by GitGuardian, a provider of security tools for scanning Git repositories, finds that out of 2,000 images pushed to Docker Hub, a total of 7% contained at least one ...

Using Service Mesh to Enable Zero-Trust Architecture (ZTA)
Cybersecurity is not only a threat to private enterprises, it’s a national government priority, too. A 2021 presidential executive order names zero-trust architecture (ZTA) as part of new cybersecurity initiatives across government ...

Lacework Labs Finds Backdoors in Container Images
Cloud security platform provider Lacework this week published a report that reveals cybercriminals are now creating backdoors in legitimate container images. Lacework Labs reports it has discovered that a threat actor, dubbed ...