security Aqua Security Applying DevSecOps to Container Security Headaches

Aqua Security Report Reveals Docker API Security Mess

Aqua Security published a report today that shows widespread cloud misconfiguration issues also extend to Docker containers. The report finds more than 40% of users had at least one misconfigured Docker application ...
runtime, visibility, Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

Taking Cloud-Native Security to the Next Level

It’s no secret that containers and Kubernetes offer unparalleled speed and agility. As organizations look to the technology for the ability to scale and deliver modern applications, Gartner predicts containers will be ...
access ransomware Anchore Snyk

How Kubernetes Protects Enterprises From Ransomware

Today’s complex enterprise IT workloads require the scale and flexibility that only Kubernetes can deliver. But security issues facing Kubernetes users continue to disrupt critical operations, particularly as ransomware inflicts increasing damage ...
Helm D2iQ assessment gap steer kubernetes 1.27

Kubernetes Practices Gap Assessment

Using Kubernetes to orchestrate containerized software has proven value for DevOps value streams. To get the maximum value from Kubernetes, it is important to use recommended best practices, inclusive of people, processes ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

15 Point Kubernetes Security Checklist

Thoroughly securing containers and Kubernetes environments – especially in production where they’re most vulnerable – requires a layered security strategy with consistent vigilance across multiple fronts. Kubernetes itself has become an increasingly ...
OpenTofu, infrastructure IaC Kubernetes Leveraging Ephemeral Infrastructure Effectively

Treating Kubernetes as a Source of Truth

Kubernetes is proliferating within today’s IT strata because it is not just a container scheduler; it ships with impressive authentication and RBAC capabilities. With these features, Kubernetes could be used for things ...
HYCU Druva Kubernetes

HYCU adds Kubernetes Support to Data Protection Platform

HYCU, Inc. this week announced that the first instances of support for Kubernetes clusters are now available via its data protection platform hosted in the cloud. Subbiah Sundaram, vice president of products ...
big data DH2i cloud-native database data protection Databases and Postgres in Containers

Data Protection for Stateful Applications in Kubernetes

Stateful applications: Whether or not you believe they belong in Kubernetes, the fact is most organizations run a combination of stateful and stateless workloads in containers. Stateful applications and workloads require back ...
Platform9, platform, Red Hat, Kubernetes, OpenShift, red hat, AI, open source, environments Red Hat Extends OpenShift Platform Plus Environment

Container Security Fact Vs. Fiction

One strange consequence of the COVID-19 pandemic is that, since almost all tech conferences in the world have moved online, it’s been easier than ever to attend. That means – in my ...
DigiCert Uses Containers to Extend Certificate Management Reach

DigiCert Uses Containers to Extend Certificate Management Reach

DigiCert today launched DigiCert Automation Manager that employs containers to make a cloud platform for managing certificates more accessible from within an on-premises IT environment. Brian Trzupek, senior vice president of product ...