vulnerabilities
Unlocking the Full Potential of Container Vulnerability Scans
Given the complex dependencies of container images, which can rely on other container images with potential vulnerabilities, it is crucial for developers to proactively identify and address container security vulnerabilities before deployment ...
Survey Surfaces Cloud-Native Application Security Challenges
A global survey of 600 DevOps, engineering and security professionals finds more than two-thirds (67%) reporting their organization has delayed or slowed application development as a result of security concerns. Conducted by ...
Best of 2023: Three Newly-Discovered Kubernetes Ingress Vulnerabilities Create Security Challenge
Three vulnerabilities were disclosed that impact ingress controllers based on open source Nginx software embedded within Kubernetes clusters ...
ARMO Brings VEX to Kubernetes Security Posture Management Platform
ARMO added support for VEX to Kubescape, an open source security posture management project for Kubernetes ...
KSOC Shares List of Top Eight Kubernetes Vulnerabilities
Kubernetes Security Operations Center (KSOC) has published a list of the eight Kubernetes vulnerabilities that are most likely to be exploited. The list is based on an Exploit Prediction Scoring System (EPSS) ...
Sysdig Report Surfaces Major Lack of Container Security
A new Sysdig report finds 87% of container images have high-risk vulnerabilities of which 15% make their way into runtime environments. The report also finds that 71% of those vulnerabilities have a ...
Overcoming Container Security Gaps With Active Vulnerability Management
Organizations can reduce security risks in containerized applications by actively managing vulnerabilities through scanning, automated image deployment, tracking runtime risk and deploying mitigating controls. Kubernetes and containers have become de facto standards ...
Aqua Security Report Finds Malicious Images on DockerHub
Aqua Security has published a report that identifies five malicious Docker images that have collectively been pulled more than 130,000 times from the Docker Hub repository. The images hijack organizations’ resources to ...
Report: Docker Hub Container Vulnerabilities High
Prevasio, a provider of a cloud service for scanning container images, this week released a report based on a scan of 4 million public container images found in Docker Hub that concludes ...
5 Best Practices for Ensuring Secure Container Images
Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will be in production. For containerized workloads, securing the container image throughout the ...