Cloud-Native Security

15 Point Kubernetes Security Checklist
Thoroughly securing containers and Kubernetes environments – especially in production where they’re most vulnerable – requires a layered security strategy with consistent vigilance across multiple fronts. Kubernetes itself has become an increasingly ...

Treating Kubernetes as a Source of Truth
Kubernetes is proliferating within today’s IT strata because it is not just a container scheduler; it ships with impressive authentication and RBAC capabilities. With these features, Kubernetes could be used for things ...

HYCU adds Kubernetes Support to Data Protection Platform
HYCU, Inc. this week announced that the first instances of support for Kubernetes clusters are now available via its data protection platform hosted in the cloud. Subbiah Sundaram, vice president of products ...

Data Protection for Stateful Applications in Kubernetes
Stateful applications: Whether or not you believe they belong in Kubernetes, the fact is most organizations run a combination of stateful and stateless workloads in containers. Stateful applications and workloads require back ...

Container Security Fact Vs. Fiction
One strange consequence of the COVID-19 pandemic is that, since almost all tech conferences in the world have moved online, it’s been easier than ever to attend. That means – in my ...

DigiCert Uses Containers to Extend Certificate Management Reach
DigiCert today launched DigiCert Automation Manager that employs containers to make a cloud platform for managing certificates more accessible from within an on-premises IT environment. Brian Trzupek, senior vice president of product ...

4 Pillars of Cloud-Native Security
Many enterprise IT organizations today rely on traditional security policies and tools that were not built to deal with the change, scale and complexity of cloud-native environments. While it’s hard to believe, ...

Leveling Up Container Security with Security-as-Code
As more organizations adopt a microservices deployment model, they’re also adopting infrastructure-as-code (IaC) to streamline continuous delivery. IaC codifies configurations to automate the deployment and provisioning of services. But how about security-as-code? ...

Container Security Market Poised for Major Growth
Many enterprises and large organizations are on the lookout for cloud-native security startups to add to their portfolios. From Cisco, which acquired PortShift and Banzai Cloud in late 2020, to Rapid7, which ...

CyberArk Unveils Open Source Pen Testing Tool for Kubernetes
CyberArk today launched an open source penetration testing framework, dubbed Kubesploit, for testing Kubernetes environments. Eviatar Gerzi, a cybersecurity researcher at CyberArk Labs, says that as more instances of Kubernetes clusters are ...