Cloud-Native Security
TrapX Security Brings Deception Platform to Container Environments
TrapX Security this week announced that its deception platform for misdirecting attacks against IT environments can now be deployed in container environments. Steve Preston, TrapX CEO, says version 7.2 of TrapX DeceptionGrid ...
Are We There Yet? The State of Cloud-Native Security
In this session from DevOps Connect: RSAC 2021, Matt Jarvis and Simon Maple from Snyk discuss new, insightful and surprising findings on cloud-native application security from a recent industry survey. Learn about ...
5 Reasons to Back Up Kubernetes Applications
Software containers are at the heart of cloud-native business transformation initiatives, and they are a natural evolution from virtual machines to a more granular and portable application environment in clouds. Containers are ...
Threat Stack Deepens Threat Discovery Reach for Amazon EKS
Threat Stack announced today it is extending its threat monitoring platform for the public cloud service from Amazon Web Services (AWS) to include the Amazon Elastic Kubernetes Service (Amazon EKS) on the ...
Misconfigured Argo Workflows Expose K8s to Attack
With the use of Kubernetes growing rapidly among enterprises comes increased opportunities for attackers to exploit the popular container orchestration platform’s weaknesses in security. This week, security specialist Intezer has detected a ...
Aqua Security Survey Surfaces Container Security Knowledge Gap
Aqua Security today published a survey that polled a mix of 150 cloud-native security practitioners and IT executives that suggests awareness of potential container security issue is dangerously low at a time ...
Sysdig Acquires Apolicy to Automate Container Security
Sysdig today announced it intends to acquire Apolicy to add an ability to automate remediation of container infrastructure misconfigurations provisioned using tools such as Terraform. Terms of the deal were not disclosed ...
The What and Why of Cloud-Native Security
On the road to embracing DevOps, many IT organizations still depend on traditional security practices, policies and tools that were not built to withstand the modern cloud-native approaches of scaling and complexity ...
Kubernetes Maturity Phase 4: Security, Efficiency and Reliability
In our earlier articles, we introduced the Kubernetes maturity model, discussed how to prepare for Kubernetes, explored the transformation phase, planned deployment and built confidence in successful deployment. Now, you’re ready to ...

