GitOps policy-as-code security KubeCon TriggerMesh serverless computing

Shift-Left Security is About Empowerment, Not Encroachment

Containers have changed the security conversation in many organizations There are many reasons why containers have become popular in recent years. For one, they help developers maintain consistency across platforms and through ...
attacks, DDoS, containers network edge

Threat Stack Extends Cybersecurity Reach to Kubernetes

Threat Stack, a provider of a software-as-a-service (SaaS) application that makes use of agent software to discover potential cybersecurity threats, has extended the reach of its platform to include support for Kubernetes ...
docksec, devsecops, NVIDIA NIM, developers, AI, GenAI, cloud native developers Torc Trend Micro Advances DevSecOps via Kubernetes

Trend Micro Advances DevSecOps via Kubernetes Integration

Trend Micro is now making it possible to employ Kubernetes to orchestrate security scans of container images conducted by Trend Micro Deep Security, its suite of of tools that rely on deep ...
container security

Sysdig to Provide Greater Visibility into Container Security

At this week’s Google Cloud Next 2019 conference, Sysdig announced it will offer a preview of the next iteration of a platform for monitoring and securing containers that provides IT organizations with ...
Venafi container vulnerabilities

The Evolution of Container Security

Containers have evolved substantially since Docker’s introduction in 2013. So have the security challenges and solutions that organizations should think about when designing a container security strategy. Here’s a look at how ...
state, stateless, kubernetes, scanning, cloudsmith, stateless ephemeral stateful security Kubernetes unikernel Sumo Logic

The State of Container Security

To deploy containers in production today, you need to secure them. A growing list of companies want to help you do that. Here’s an overview of the major commercial offerings that cater ...
GitOps Red Hat OpenShift

Report: Containers Are Weakest Security Link Again

For a second year in a row, a survey of 1,200 IT security decision-makers conducted by the research firm CyberEdge Group finds that, in terms of attack surfaces that organizations feel they ...
TLS, certificates, Docker, vulnerabilities, supply chain, KubeCon, SigStore, Kubernetes TrapX container security

The 4 Most Vulnerable Areas of Container Security in 2019

Software containers have become more popular in recent years as many organizations have discovered the benefits of containerization. Unfortunately, as is often the case with rapid advances in technology, container security has ...
Nirmata Navigating Compliance Challenges In a DevOps World

Navigating Compliance Challenges in a DevOps World

Less than three months after Kubernetes’ first serious security vulnerability was discovered, news broke out about a new and even more severe container escape vulnerability impacting runC (details can be found here) ...
Data Google Signal Sciences

IBM Cloud Data Shield Brings Data in Use Protection to Container Applications

Building applications that protect data while it is in use has long been a challenge for the world of DevOps. After all, DevOps promotes the concept of fast software iterations, which can ...