The Future of Workload Isolation with Emily Long

The Future of Workload Isolation with Emily Long

Edera CEO Emily Long, in the wake of the company picking up an additional $15 million in funding, explains why a new approach to isolating workloads is needed to better secure IT ...
zero-trust, Tigera zero-trust GitOps DevSecOps Kubernetes

The Key to Securing Hybrid Cloud Environments is Zero-Trust

Unlike traditional models that grant implicit trust based on network location, zero-trust assumes that no entity should be trusted by default ...
Proactive Container Security: Prioritizing Vulnerabilities with Reachability

Proactive Container Security: Prioritizing Vulnerabilities with Reachability

Did you know 70% of container vulnerabilities are never exploited? But the 30% that are can be devastating. In today’s fast-paced DevOps environment, ensuring the security of containerized applications is more critical ...
posture, security posture management, KSPM, Kubernetes KSPM cloud-native Fugue security

Achieving Kubernetes Security Posture Management (KSPM)

Kubernetes has emerged as the de facto standard for container orchestration. It introduces powerful management capabilities, but it also presents some formidable security challenges—especially in multi-cloud environments. These include a lack of ...
cloud-native, project, istio, ambient, architecture, modules, cloud native, CCoE Kubernetes Virtana CrowdStrike cloud native

Kubernetes Security is the Future of Cloud Security

By 2025, securing Kubernetes (K8s) will be recognized as the most important aspect of cloud security. In the most successful organizations, CTOs and CISOs already understand the importance of Kubernetes security. But ...
user AWS Trend Micro cloud-native Oxeye Red Hat OpenShift

AWS Strengthens Container Security in the Cloud

Amazon Web Services (AWS) has extended the reach of the Amazon GuardDuty security monitoring service to include threat detection for the runtime environments in which containers are deployed. In addition, AWS Nitro ...
container security, vulnerabilities, Diagrid, APIs, Sysdig APIs container security Apiiro CrowdStrike kubernetes Unit 42 container containerization security

Sysdig Report Reveals True Cost of Container Security Breaches

A Sysdig report published today finds that for every dollar cybercriminals generate through a cryptomining attack against a cloud container environment, victims end up paying a $53 bill. As a result, an ...
cloud-native, project, istio, ambient, architecture, modules, cloud native, CCoE Kubernetes Virtana CrowdStrike cloud native

CrowdStrike Adds Container Support to Cloud Security Platform

CrowdStrike today launched a cloud-native application protection platform (CNAPP) based on its Falcon Cloud Workload Protection (CWP) offering that can now detect threats aimed at containers, prevent rogue containers from running and ...
Cado VMware container security

VMware Adds Container Scanning Tool to Security Platform

VMware today announced it has added a VMware Carbon Black Cloud Container offering that makes it possible to scan containers and Kubernetes configurations within the context of a DevSecOps workflow. Shemer Schwarz, ...
security compliance, NSA Kubernetes stateful kubernetes k8s Kublr

K8s and Cloud Security: Compliance Just Ain’t Enough

Over just two years, breaches caused by cloud misconfigurations exposed 33.5 billion records and generated an estimated $5 trillion in damages. Amid rising cyberattacks and novel vulnerabilities, overlooking cloud and K8s security ...