containers, security, air-gapped, Kubernetes, air gapped SUSE container Weaveworks container security ThreatStack Qualys

Qualys Secures Containers Using Lightweight Agent

Qualys today announced Container Runtime Security, a new approach to securing containers that makes use of functions to enable agent software that applies security policies to be embedded within a container. Sumedh ...
Kubernetes security FusionAuth secure container images

5 Best Practices for Ensuring Secure Container Images

Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will be in production. For containerized workloads, securing the container image throughout the ...
Kata

Kata Container Security is Good, but There’s an Achilles Heel

In an age where security is paramount, addressing the vulnerabilities in Kata containers has never been more important. What does container security have to do with ancient Greek mythology? Quite a lot ...
containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

What Will It Take to Shift Kubernetes Security Left?

Considering Kubernetes security must come earlier in the development journey Interest in Kubernetes has skyrocketed. A recent CNCF study found 84% of companies run containers in production, and 78% are using Kubernetes ...
access policy engines

Policy Engines: Ensuring Configuration Security in Kubernetes

Given their ease of use, flexibility and level of automation they deliver, policy engines have become a required component in Kubernetes clusters Kubernetes’ adoption in the enterprise has clearly grown beyond the ...
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Aqua Security Simplifies Kubernetes Security

Aqua Security today unveiled a Kubernetes Security Posture Management (KSPM) offering that provides IT teams with a set of policies and controls to automate configuration and compliance of Kubernetes clusters. In addition, ...
Veeam backup and recovery

Data Backup and Recovery Emerges as Container Issue

A survey of 334 IT professionals suggests there is a profound lack of appreciation of how dynamic container environments, which rely on DevOps processes, need to approach backup and recovery. Conducted by ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

How to Secure Your Kubernetes Cluster

Here are some key steps for securing Kubernetes clusters Kubernetes is hot in the DevOps space and is now the third most wanted platform among developers. The appeal of the platform largely ...
container security sysdig snyk container Mirantis Aqua Security GitHub

Aqua Security Allies with GitHub on Container Security

Aqua Security this week announced that its open source Trivy vulnerability scanner is now available as an Aqua Security Trivy GitHub Action, which enables DevOps teams that employ GitHub to scan both ...
container security

Anchore Adds To Container Security Toolbox

Anchore announced it is making available a series of open source container security tools that will make it possible to address a wide range of vulnerabilities long before an application is deployed ...