Infographic
In 2020, we saw an acceleration of cloud adoption that led to an increase in container usage. This increase, combined with the fact that half of containers live less than five minutes, reinforces the need to manage container-specific security risks. Our goal is to shed light on the current state of container infrastructure, applications, security, and compliance practices.
Blog
The Kubernetes API server, in all versions of Kubernetes, unfortunately allows an attacker, who is able to create a ClusterIP…
Blog
Organizations are modernizing IT infrastructure, restructuring teams, and accelerating application delivery with containers and Kubernetes. As with any technology, organizations…
Blog
Kubernetes 1.20 is about to be released, and it comes packed with novelties! Where do we begin? As we highlighted…
Blog
The Kinsing attack has recently been reported by security researchers, and it is well known for targeting misconfigured cloud native…
Blog
Microservices and Kubernetes have completely changed the way you reason about network security. Luckily, Kubernetes network policies are a native…
Blog
The control plane is the brain and heart of Kubernetes. All of its components are key to the proper working…
Blog
This article contains useful tips to implement SOC 2 compliance for containers and Kubernetes. The Service Organization Controls (SOC) reports…
Blog
While auditing the Kubernetes source code, I recently discovered an issue (CVE-2020-8566) in Kubernetes that may cause sensitive data leakage….
Video
With more than 3,000 developers and a large Kubernetes environment, learn how Yahoo Japan is preventing cyber-attacks and unauthorized access by introducing appropriate security measures for the container environment.
Blog
While auditing the Kubernetes source code, I recently discovered an issue (CVE-2020-8563) in Kubernetes that may cause sensitive data leakage….
Blog
In this article, you will learn how to monitor kube-proxy to ensure the correct health of your cluster network. Kube-proxy…