Cloud-Native Security
Aqua Security Bolsters Container Security
Now that containers are showing up with increased frequency in production environments, the challenges associated with securing those containers are becoming more apparent to developers and IT security teams alike. The latest ...
Using Machine Learning to Connect the Dots in Container Security
There is a weird, virtually universal truth about the relationship between technology and security. There is often an inverse relationship in which the more powerful, useful or convenient a technology is for ...
CNCF Adds 2 Projects to Better Secure Containers
At the Open Source Summit Europe 2017 conference today, the Cloud Native Computing Foundation (CNCF) announced it is adding two projects to its portfolio to address the security of container images and ...
Sysdig Melds Container Monitoring and Security
The concept of employing separate platforms to monitor and secure containers soon may be obsolete if Sysdig has its way. The company has added a Sysdig Secure module to provide visibility into ...
How You Can Defend Containers Against Linux Stack Clash Exploits
For those responsible for container security within their organizations, “clashing” is now much more than just a fashion faux pas: The recently discovered Linux Stack Clash vulnerability (CVE-2010-2240) is a serious threat ...
Take a DevOps-first Approach to Security that Leverages Containers
Implementing a DevOps-first approach can drive competitiveness while creating a more secure environment As famous cryptographer Bruce Schneier once said, “Security is a process, not a state or a product.” It is ...
5 Software Delivery Challenges that Containers Won’t Solve
Containers are great, but they’re not a panacea. Here are five challenges within the software delivery process that Docker containers can’t help you to solve. To be clear, I don’t mean to ...
Threat Hunting in a Container Environment
It’s a vicious world out there, with new and innovative threats around every corner. As organizations—particularly larger enterprises—move to cloud computing and adopt DevOps practices and container technologies, though, the challenge of ...
Identifying Security Weak Points in a Docker Environment
As Docker adoption increases, so does visibility into Docker containers’ security weaknesses. Here’s an overview of the types of security and privacy vulnerabilities that have been discovered in Docker containers so far ...
‘Secure by Default’: Docker’s Container Security Messaging
Containers are not only “secure by default.” They’re more secure than virtual machines. This, at least, is the thesis that Docker is pushing as container technology matures. Is it accurate? For the ...

