Cloud-Native Security
Shift-Left Security is About Empowerment, Not Encroachment
Containers have changed the security conversation in many organizations There are many reasons why containers have become popular in recent years. For one, they help developers maintain consistency across platforms and through ...
Threat Stack Extends Cybersecurity Reach to Kubernetes
Threat Stack, a provider of a software-as-a-service (SaaS) application that makes use of agent software to discover potential cybersecurity threats, has extended the reach of its platform to include support for Kubernetes ...
Trend Micro Advances DevSecOps via Kubernetes Integration
Trend Micro is now making it possible to employ Kubernetes to orchestrate security scans of container images conducted by Trend Micro Deep Security, its suite of of tools that rely on deep ...
Sysdig to Provide Greater Visibility into Container Security
At this week’s Google Cloud Next 2019 conference, Sysdig announced it will offer a preview of the next iteration of a platform for monitoring and securing containers that provides IT organizations with ...
The Evolution of Container Security
Containers have evolved substantially since Docker’s introduction in 2013. So have the security challenges and solutions that organizations should think about when designing a container security strategy. Here’s a look at how ...
The State of Container Security
To deploy containers in production today, you need to secure them. A growing list of companies want to help you do that. Here’s an overview of the major commercial offerings that cater ...
Report: Containers Are Weakest Security Link Again
For a second year in a row, a survey of 1,200 IT security decision-makers conducted by the research firm CyberEdge Group finds that, in terms of attack surfaces that organizations feel they ...
The 4 Most Vulnerable Areas of Container Security in 2019
Software containers have become more popular in recent years as many organizations have discovered the benefits of containerization. Unfortunately, as is often the case with rapid advances in technology, container security has ...
Navigating Compliance Challenges in a DevOps World
Less than three months after Kubernetes’ first serious security vulnerability was discovered, news broke out about a new and even more severe container escape vulnerability impacting runC (details can be found here) ...
IBM Cloud Data Shield Brings Data in Use Protection to Container Applications
Building applications that protect data while it is in use has long been a challenge for the world of DevOps. After all, DevOps promotes the concept of fast software iterations, which can ...

