containers
New vulnerabilities in open source packages down 20% compared to last year
New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, …
Organizations look to build resiliency with hybrid and multi-cloud architectures
Hybrid and multi-cloud architectures have become the de-facto standard among organizations, with 53 percent embracing them as the most popular form of deployment. Advantages …
Enterprises regard the cloud as critical for innovation, but struggle with security
Most enterprises (85%) believe embracing the public cloud is critical to fuel innovation, but the majority are not equipped to operate in the cloud securely, according to a …
You are focusing too much on vulnerabilities that pose little danger
Only half of the vulnerabilities in cloud containers ever posed a threat, according to a Rezilion study. The top 20 most popular container images on DockerHub were analyzed to …
Techniques and strategies to overcome Kubernetes security challenges
Five security best practices for DevOps and development professionals managing Kubernetes deployments have been introduced by Portshift. Integrating these security measures …
Container usage has grown in complexity, specific security controls are needed
Container usage has grown in scale and complexity, and doubled in density, according to Sysdig. As container technologies continue to transform how organizations deliver …
IaaS cloud vulnerabilities expected to increase 50% over 2018 figures
Although the total number of IaaS cloud vulnerabilities is still small and the technology relatively young, volumes are increasing year-over-year at a steady rate, an expected …
DevSecOps role expansion has changed how companies address their security posture
While organizations shift their applications to microservices environments, the responsibility for securing these environments shifts as well, Radware reveals. The rapid …
A compendium of container escapes
In this Help Net Security podcast recorded at Black Hat USA 2019, Brandon Edwards, Chief Scientist at Capsule8, talks about about a compendium of container escapes, and the …
What does runtime container security really mean?
End-to-end protection for containers in production is required to avoid the steep operational and reputational costs of data breaches. As news of container attacks and fresh …
Companies increasingly investing in container adoption, security remains an issue
87 percent of IT professionals are now running container technologies, with 90 percent of those running in production and 7 in 10 running at least 40 percent of their …
Organizations investing in security analytics and machine learning to tackle cyberthreats
IT security’s greatest inhibitor to success is contending with too much security data. To address this challenge, 47 percent of IT security professionals acknowledged their …