Kubernetes End of DIY Era

Best Practices for Kubernetes Incident Response

Kubernetes is the world’s most popular container orchestrator, used to manage large scale applications running on container engines like Docker. Containers are rapidly replacing virtual machines as the go-to choice for workload ...
Container Adoption not Slowed by Supply Chain Attacks

Container Adoption not Slowed by Supply Chain Attacks

The extensive adoption of containerization and DevOps has changed enterprise software supply chain risks dramatically. In many ways, enterprise software risks have increased considerably because of the rising use of third-party software ...
Lacework Red Hat Aqua Security

Red Hat Survey Finds Widespread Container Security Issues

A survey of 500 DevOps, engineering and security professionals published today by Red Hat finds 94% of respondents have experienced a security incident involving their Kubernetes and container environments during the last ...
ingress Sysdig SUSE Siloscape security-as-code Docker

Palo Alto Networks Finds First Windows Container Malware

Palo Alto Networks revealed today it has discovered the first known malware targeting Windows containers. Dubbed Siloscape, the malware employs sophisticated code obfuscation techniques to create a backdoor into a Kubernetes cluster ...
cloud-native security Nutanix

Cybersecurity and Cloud-Native Application Connectivity

The Colonial Pipeline hack and the shutdown of the U.S.’s largest fuel pipeline was only one of many recent ransomware attacks on our nation’s hospitals, financial institutions and critical infrastructure. Can government ...
edge, containers, containerization, containers, Edara, Buildpacks, container, dockerfiles, time, containers, security, and, Docker, DevOps, docker containers, python, add-ons, kubernetes, Chainguard Docker container Stormforge Azure containers Microsoft New Relic Java Kublr platform Containers on Azure

Enterprise Container Platforms Optimize Operations

As I indicated in my prior blog, A New Approach to K8s and Containers, a new kind of enterprise Kubernetes-based container platform is needed to accelerate time-to-value and realize efficient, safe operation ...
security Aqua Security Applying DevSecOps to Container Security Headaches

Aqua Security Report Reveals Docker API Security Mess

Aqua Security published a report today that shows widespread cloud misconfiguration issues also extend to Docker containers. The report finds more than 40% of users had at least one misconfigured Docker application ...
Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

Taking Cloud-Native Security to the Next Level

It’s no secret that containers and Kubernetes offer unparalleled speed and agility. As organizations look to the technology for the ability to scale and deliver modern applications, Gartner predicts containers will be ...
access ransomware Anchore Snyk

How Kubernetes Protects Enterprises From Ransomware

Today’s complex enterprise IT workloads require the scale and flexibility that only Kubernetes can deliver. But security issues facing Kubernetes users continue to disrupt critical operations, particularly as ransomware inflicts increasing damage ...
Helm D2iQ assessment gap steer kubernetes 1.27

Kubernetes Practices Gap Assessment

Using Kubernetes to orchestrate containerized software has proven value for DevOps value streams. To get the maximum value from Kubernetes, it is important to use recommended best practices, inclusive of people, processes ...