Enterprises increasingly adopting containers, many turning to providers for support

U.S. enterprises increasingly are adopting containers to streamline their applications workflows, with many turning to container services and solutions providers to help them get full value from this cloud-native technology, according to a report by In… Continue reading Enterprises increasingly adopting containers, many turning to providers for support

ThreatMapper: Open source platform for scanning runtime environments

Deepfence announced open source availability of ThreatMapper, a signature offering that automatically scans, maps and ranks application vulnerabilities across serverless, Kubernetes, container and multi-cloud environments. Scanning runtime environments… Continue reading ThreatMapper: Open source platform for scanning runtime environments

IT executives do not believe their business can have both a flexible and usable Kubernetes environment

A Dimensional Research survey shares Kubernetes best practices and key insights about the rapidly growing and evolving use of Kubernetes within businesses. The findings of the survey highlight the need for continued innovation in the way Kubernetes and… Continue reading IT executives do not believe their business can have both a flexible and usable Kubernetes environment

How do I select a container security solution for my business?

The adoption of container architectures is growing steadily, but security and compliance remain top concerns for enterprises, a recent survey revealed. To select a suitable container security solution for your business, you need to think about a variet… Continue reading How do I select a container security solution for my business?

Kubescape helps admins manage Kubernetes securely

Kubescape is an open-source tool for testing if Kubernetes is deployed securely, as defined in the recently released Kubernetes Hardening Guidance by NSA and CISA. About Kubernetes (“K8s”) Kubernetes is an open-source platform for automatin… Continue reading Kubescape helps admins manage Kubernetes securely

Security and compliance still a challenge for container architectures

While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly acute challenge for respondents, a NeuVector survey of more than 1,200 enterprise… Continue reading Security and compliance still a challenge for container architectures

Cisco beefing up app monitoring portfolio with acquisition of Epsagon for $500M

Cisco announced on Friday that it’s acquiring Israeli applications monitoring startup Epsagon at a price pegged at $500 million. The purchase gives Cisco a more modern microservices-focused component for its growing applications monitoring portfolio. The Israeli business publication Globes reported it had gotten confirmation from Cisco that the deal was for $500 million, but Cisco would […] Continue reading Cisco beefing up app monitoring portfolio with acquisition of Epsagon for $500M

A digital shift requires a new approach to asset management: How to reduce security risks

The global pandemic forced organizations to rapidly accelerate their digital transformation. As a result, nearly overnight, companies spanning all sizes and sectors deployed technologies like cloud and containers to support the shift to IoT and address… Continue reading A digital shift requires a new approach to asset management: How to reduce security risks

The knowledge gap around runtime security and the associated risks

According to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating that the default security capabilities of containers are overestimated. This … Continue reading The knowledge gap around runtime security and the associated risks

It takes less than one hour to exploit vulnerable container infrastructure

Aqua Security published a research revealing a continued rise in cyberattacks targeting container infrastructure and supply chains, and showing that it can now take less than one hour to exploit vulnerable container infrastructure. The report provides … Continue reading It takes less than one hour to exploit vulnerable container infrastructure