containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

Cloud-Native Security and the Risks of AI

Kubernetes security as it applies to AI involves no shortage of challenges and risks to overcome ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

OWASP Kubernetes Top 10 Overview

The OWASP Kubernetes Top 10 accumulates some of the most pressing risks and vulnerabilities associated with developing on Kubernetes ...
Canonical VMware DoD AWS Finch CRI-O container containers

VMware Extends XDR to Containers and Kubernetes

VMware will expand the reach of its Carbon Black XDR cybersecurity platform to containers and Kubernetes within the next six months ...
Java Veeam data AppSec technical debt

Cloud-Native AppSec: Lessons From the Fortune 100

While cloud-native technologies are relatively new to many businesses, Global 2,000 companies have run containers and distributed applications built with microservices and running on platforms like Kubernetes at scale for over a ...
Kubernetes

Security Testing for Kubernetes Clusters

Containerization and microservices have taken center stage, with Kubernetes leading the charge as the go-to orchestration platform. As powerful and versatile as Kubernetes is, its complexity introduces significant security challenges that organizations ...
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Automating Security in Containers With DevSecOps

Containers have become incredibly popular in software development. They make it easy for organizations to quickly build, deploy and manage scalable and efficient applications. However, as more and more organizations adopt container ...
The State of Cloud-Native Security

The State of Cloud-Native Security

Cloud native is becoming the defacto development method for new applications and workloads. Yet, the cloud-native trend also brings accelerated deployment timelines, which could leave security gaps in CI/CD. Studies also find ...
Portworx Adds Data Migration Tools

Securing Cloud-Native Data in Transit

Data is central to all cloud-native applications, and keeping that data safe and secure is a challenge all application owners struggle with. When discussing securing the data you use with your cloud-native ...
Kubernetes step 3 Big Steps in Container Adoption

2023 Benchmark Kubernetes Report: 6 K8s Reliability Missteps

The cloud is increasingly the preferred destination for organizations to build their applications and services. Despite a year dominated by headlines about economic uncertainty as inflation grows and banks teeter, most organizations ...
KSOC Kubernetes

KSOC Shares List of Top Eight Kubernetes Vulnerabilities

Kubernetes Security Operations Center (KSOC) has published a list of the eight Kubernetes vulnerabilities that are most likely to be exploited. The list is based on an Exploit Prediction Scoring System (EPSS) ...