phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

15 Point Kubernetes Security Checklist

Thoroughly securing containers and Kubernetes environments – especially in production where they’re most vulnerable – requires a layered security strategy with consistent vigilance across multiple fronts. Kubernetes itself has become an increasingly ...
OpenTofu, infrastructure IaC Kubernetes Leveraging Ephemeral Infrastructure Effectively

Treating Kubernetes as a Source of Truth

Kubernetes is proliferating within today’s IT strata because it is not just a container scheduler; it ships with impressive authentication and RBAC capabilities. With these features, Kubernetes could be used for things ...
HYCU Druva Kubernetes

HYCU adds Kubernetes Support to Data Protection Platform

HYCU, Inc. this week announced that the first instances of support for Kubernetes clusters are now available via its data protection platform hosted in the cloud. Subbiah Sundaram, vice president of products ...
big data DH2i cloud-native database data protection Databases and Postgres in Containers

Data Protection for Stateful Applications in Kubernetes

Stateful applications: Whether or not you believe they belong in Kubernetes, the fact is most organizations run a combination of stateful and stateless workloads in containers. Stateful applications and workloads require back ...
Platform9, platform, Red Hat, Kubernetes, OpenShift, red hat, AI, open source, environments Red Hat Extends OpenShift Platform Plus Environment

Container Security Fact Vs. Fiction

One strange consequence of the COVID-19 pandemic is that, since almost all tech conferences in the world have moved online, it’s been easier than ever to attend. That means – in my ...
DigiCert Uses Containers to Extend Certificate Management Reach

DigiCert Uses Containers to Extend Certificate Management Reach

DigiCert today launched DigiCert Automation Manager that employs containers to make a cloud platform for managing certificates more accessible from within an on-premises IT environment. Brian Trzupek, senior vice president of product ...
containers, AI, Kubernetes, cloud-native security IBM Kubernetes

4 Pillars of Cloud-Native Security

Many enterprise IT organizations today rely on traditional security policies and tools that were not built to deal with the change, scale and complexity of cloud-native environments. While it’s hard to believe, ...
ingress Sysdig SUSE Siloscape security-as-code Docker

Leveling Up Container Security with Security-as-Code

As more organizations adopt a microservices deployment model, they’re also adopting infrastructure-as-code (IaC) to streamline continuous delivery. IaC codifies configurations to automate the deployment and provisioning of services. But how about security-as-code? ...
containers, container security, GenAI, Cado VMware container security

Container Security Market Poised for Major Growth

Many enterprises and large organizations are on the lookout for cloud-native security startups to add to their portfolios. From Cisco, which acquired PortShift and Banzai Cloud in late 2020, to Rapid7, which ...
Docker, Trend Micro, SIEM attack Aqua Security CyberArk pen testing Accurics

CyberArk Unveils Open Source Pen Testing Tool for Kubernetes

CyberArk today launched an open source penetration testing framework, dubbed Kubesploit, for testing Kubernetes environments. Eviatar Gerzi, a cybersecurity researcher at CyberArk Labs, says that as more instances of Kubernetes clusters are ...