Please turn on your JavaScript for this page to function normally.
HITB trainings
Cybersecurity training: Learn how to secure containerized environments

Driven by a strong curiosity to know how computers and computer programs are made, how they work, and how safe they are, Sheila A. Berta, Head of Security Research at Dreamlab …

Qualys
Qualys Container Runtime Security: Defense for containerized applications

Qualys announced Container Runtime Security, which provides runtime defense capabilities for containerized applications. Qualys Runtime Container Security This new approach …

Aqua Security unveils Kubernetes-native security capabilities

Aqua Security announced a suite of new Kubernetes-native security capabilities, providing a holistic approach to securing applications that run on Kubernetes, across the …

Druva introduces simplified, enterprise-grade backup and disaster recovery support for Kubernetes

Druva announced beta support for Kubernetes workloads which delivers complete application protection that is accessible by all teams, including the central IT team and DevOps. …

RackWare streamlines multi-cloud migration, and disaster recovery services for Kubernetes

RackWare is expanding its offering to allow businesses to easily migrate to and protect containers in the cloud. RackWare’s new Kubernetes offering, SWIFT, augments RackWare’s …

organize
Plan for change but don’t leave security behind

COVID-19 has upended the way we do all things. In this interview, Mike Bursell, Chief Security Architect at Red Hat, shares his view of which IT security changes are ongoing …

cloud
Large-scale migrations away from on-premise environments are underway

COVID-19 has had a massive effect on DevOps, leading to large-scale migrations away from on-premises environments, a Codefresh survey reveals. At the same time, DevOps …

error
Updated cryptojacking worm steals AWS credentials

A malicious cryptocurrency miner and DDoS worm that has been targeting Docker systems for months now also steals Amazon Web Services (AWS) credentials. What’s more, …

Red Hat OpenShift
Red Hat OpenShift 4.5: Breaking down app barriers between traditional and cloud-native infrastructure

Red Hat announced the general availability of Red Hat OpenShift 4.5, the latest version of the industry’s most comprehensive Kubernetes platform. Red Hat OpenShift 4.5, which …

CloudPassage Halo’s new capabilities support generic Docker hosts, Kubernetes nodes, and AWS ECS

CloudPassage announced expanded container-related security capabilities for its award-winning Halo cloud security platform. A range of Halo’s capabilities have been …

container security
HPE Container Platform: Unified container platform built on open source Kubernetes

The HPE Container Platform is the industry’s first enterprise-grade container platform designed to support both cloud-native and non-cloud-native applications using 100 …

container
Container security requires continuous security in new DevSecOps models

When Jordan Liggitt at Google posted details of a serious Kubernetes vulnerability in November 2018, it was a wake-up call for security teams ignoring the risks that came with …

Don't miss

Cybersecurity news