Please turn on your JavaScript for this page to function normally.
error
Updated cryptojacking worm steals AWS credentials

A malicious cryptocurrency miner and DDoS worm that has been targeting Docker systems for months now also steals Amazon Web Services (AWS) credentials. What’s more, …

connection
Everyone’s talking about microservices, who’s actually doing it?

77% of organizations have adopted microservices, with 92% experiencing success with microservices, according to an O’Reilly survey. Teams who own the software lifecycle …

Snyk
New vulnerabilities in open source packages down 20% compared to last year

New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, …

cloud
Organizations look to build resiliency with hybrid and multi-cloud architectures

Hybrid and multi-cloud architectures have become the de-facto standard among organizations, with 53 percent embracing them as the most popular form of deployment. Advantages …

cloud storage
Enterprises regard the cloud as critical for innovation, but struggle with security

Most enterprises (85%) believe embracing the public cloud is critical to fuel innovation, but the majority are not equipped to operate in the cloud securely, according to a …

code
You are focusing too much on vulnerabilities that pose little danger

Only half of the vulnerabilities in cloud containers ever posed a threat, according to a Rezilion study. The top 20 most popular container images on DockerHub were analyzed to …

Kubernetes
Techniques and strategies to overcome Kubernetes security challenges

Five security best practices for DevOps and development professionals managing Kubernetes deployments have been introduced by Portshift. Integrating these security measures …

containers
Container usage has grown in complexity, specific security controls are needed

Container usage has grown in scale and complexity, and doubled in density, according to Sysdig. As container technologies continue to transform how organizations deliver …

cloud
IaaS cloud vulnerabilities expected to increase 50% over 2018 figures

Although the total number of IaaS cloud vulnerabilities is still small and the technology relatively young, volumes are increasing year-over-year at a steady rate, an expected …

DevSecOps
DevSecOps role expansion has changed how companies address their security posture

While organizations shift their applications to microservices environments, the responsibility for securing these environments shifts as well, Radware reveals. The rapid …

Capsule8
A compendium of container escapes

In this Help Net Security podcast recorded at Black Hat USA 2019, Brandon Edwards, Chief Scientist at Capsule8, talks about about a compendium of container escapes, and the …

container
What does runtime container security really mean?

End-to-end protection for containers in production is required to avoid the steep operational and reputational costs of data breaches. As news of container attacks and fresh …

Don't miss

Cybersecurity news