TLS, certificates, Docker, vulnerabilities, supply chain, KubeCon, SigStore, Kubernetes TrapX container security

TrapX Security Brings Deception Platform to Container Environments

TrapX Security this week announced that its deception platform for misdirecting attacks against IT environments can now be deployed in container environments. Steve Preston, TrapX CEO, says version 7.2 of TrapX DeceptionGrid ...
Cloud-Native Security

Cloud-Native Security

Click the link below to view this infographic: cloud-native-security ...
|
runtime, visibility, Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

Are We There Yet? The State of Cloud-Native Security

In this session from DevOps Connect: RSAC 2021, Matt Jarvis and Simon Maple from Snyk discuss new, insightful and surprising findings on cloud-native application security from a recent industry survey. Learn about ...
containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

5 Reasons to Back Up Kubernetes Applications

Software containers are at the heart of cloud-native business transformation initiatives, and they are a natural evolution from virtual machines to a more granular and portable application environment in clouds. Containers are ...
Threat Stack monolith microservices

Threat Stack Deepens Threat Discovery Reach for Amazon EKS

Threat Stack announced today it is extending its threat monitoring platform for the public cloud service from Amazon Web Services (AWS) to include the Amazon Elastic Kubernetes Service (Amazon EKS) on the ...
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Misconfigured Argo Workflows Expose K8s to Attack

With the use of Kubernetes growing rapidly among enterprises comes increased opportunities for attackers to exploit the popular container orchestration platform’s weaknesses in security. This week, security specialist Intezer has detected a ...
Lacework Red Hat Aqua Security

Aqua Security Survey Surfaces Container Security Knowledge Gap

Aqua Security today published a survey that polled a mix of 150 cloud-native security practitioners and IT executives that suggests awareness of potential container security issue is dangerously low at a time ...
API Sysdig Apolicy ADC

Sysdig Acquires Apolicy to Automate Container Security

Sysdig today announced it intends to acquire Apolicy to add an ability to automate remediation of container infrastructure misconfigurations provisioned using tools such as Terraform. Terms of the deal were not disclosed ...
containers, AI, Kubernetes, cloud-native security IBM Kubernetes

The What and Why of Cloud-Native Security

On the road to embracing DevOps, many IT organizations still depend on traditional security practices, policies and tools that were not built to withstand the modern cloud-native approaches of scaling and complexity ...
phase kubernetes maturity model

Kubernetes Maturity Phase 4: Security, Efficiency and Reliability

In our earlier articles, we introduced the Kubernetes maturity model, discussed how to prepare for Kubernetes, explored the transformation phase, planned deployment and built confidence in successful deployment. Now, you’re ready to ...