security

Bridging Observability & Security in Kubernetes: Beyond Just Metrics
Kubernetes has expanded agility but also the attack surface. Alan argues that observability and security can no longer live in silos — metrics, logs, and traces already hold critical security signals, while ...
Alan Shimel | | anomaly detection, C2 traffic, cloud native security, convergence, cross-training, crypto-mining, devops, kubernetes, lateral movement, logs, metrics, observability, observability-driven security, OpenTelemetry, organizational silos, platform engineering, runtime security, security, SRE, tool sprawl, traces

The Corrupt Algorithm: Securing the AI Supply Chain with Containers
The pipelines are green. The dashboards are clear. Commits are flowing without a hitch. For most DevOps teams, that’s the definition of success: smooth builds, tested deployments, automation firing on all cylinders ...

Tigera Extends Project Calico Reach to Secure AI Workloads
Tigera this week added an instance of its integrated container networking and security platform for Kubernetes environments that is specifically designed for artificial intelligence (AI) workloads. Based on open source Project Calico ...

Security Tool Sprawl: The New Breach Vector for Cloud Native
“More is better” has always been a dangerous assumption in tech. In security, it’s downright reckless. Across the cloud-native ecosystem, organizations are drowning in their own defenses: dozens of overlapping tools, agents, ...

How Anthropic Dogfoods On Claude Code
Anthropic is using its own Claude Code agentic coding tool to help its teams with coding tasks and to master preexisting code understanding ...

Why DockSec is the Security Layer Your Dockerfiles Were Missing
This article walks you through how DockSec works, what makes it different and why it matters for modern DevSecOps workflows. ...

Automating Kubernetes Cleanup in CI Workflows
Continuous integration (CI) practices are now mainstream and have significantly increased deployment frequency while decreasing defect rates for organizations worldwide. This boosts mean time to repair (MTTR), market responsiveness, risk reduction, software ...

Security in Kubernetes: Your Stack is Lying to You
The organizations that succeed will not be the ones with the most tools. They will be the ones that treat security as code, embed it into every commit and align their practices ...

Hardening Kubernetes Security with DevSecOps Practices
As organizations embrace the speed of Kubernetes, they often find their existing security practices lagging, creating a dangerous gap between development velocity and security posture ...

Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
In containerized environments security risks can exist in three areas: Vulnerabilities in software, shadow containers and deployment problems ...