Please turn on your JavaScript for this page to function normally.
MITRE ATT&CK
MITRE ATT&CK v9 is out and includes ATT&CK for Containers

The Mitre Corporation has released the ninth version of its ATT&CK knowledge base of adversary tactics and techniques, which now also includes a newly created ATT&CK …

Kubernetes
Managing and maturing Kubernetes security in the enterprise

The TL;DR version of the Infoworld article went something like this: “Companies are shying away from managing their own Kubernetes clusters and more and more, turning to …

containers
Application container market to grow steadily by 2026

The application container market is expected to register a CAGR of 29% over the forecast period 2021 to 2026, according to ResearchAndMarkets. Increasing deployments of …

container
Container security is a priority, but who’s responsibility is it?

NeuVector released a survey that identifies current trends and challenges enterprises are grappling with as they increasingly turn to microservices architectures. Among …

containers
Most containers are running as root, which increases runtime security risk

While container usage reveals organizations are shifting left by scanning images during the build phase, DevOps teams are still leaving their environments open to attack, …

application
Growth of cloud-native apps and containerization to define 2021

Scality announced its data storage predictions for 2021, focusing on the rapid growth rate of cloud-native apps and containerization. According to IDC, by 2023, over 500 …

cloud
The challenges of keeping a strong cloud security posture

It’s simple – you can’t secure what you can’t see or don’t know about. In this interview, Badri Raghunathan, Director of Product Management for Container and Serverless …

Kubernetes
Enterprises embrace Kubernetes, but lack security tools to mitigate risk

Businesses increasingly embrace the moving of multiple applications to the cloud using containers and utilize Kubernetes for orchestration, according to Zettaset. However, …

HITB trainings
Cybersecurity training: Learn how to secure containerized environments

Driven by a strong curiosity to know how computers and computer programs are made, how they work, and how safe they are, Sheila A. Berta, Head of Security Research at Dreamlab …

GitHub
GitHub envisions a world with fewer software vulnerabilities

After five months in beta, the GitHub Code Scanning security feature has been made generally available to all users: for free for public repositories, as a paid option for …

container
Challenges and drivers influencing container infrastructure backup and recovery

As containers continue to rise in popularity, organizations need to understand that they are uniquely designed and consequently require a specialized data protection strategy. …

Attacks growing in both scope and sophistication, exposing gaps in the cloud native toolchain

There’s a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure, according to Aqua Security. While most attacks were aimed …

Don't miss

Cybersecurity news