4. More maturation of tools around Kubernetes Kubernetes is itself fundamentally an automation technology. As it matures and adoption continues growing, expect to see more automation built around Kubernetes and how teams use it. “2021 will see more automation around Kubernetes, specifically around the deployment process,” says Eran Bibi, director of DevOps and cloud platform …
CISOs will embrace DevSecOps methodologies. Cloud-native security will rise higher on the agenda for CISOs as their organizations embrace Kubernetes, serverless, and other cloud-native technologies. It’s a significant cultural shift to embed security within DevOps practices, but it’s necessary: Businesses are moving to the cloud so they can deliver new features quickly and at high frequency, and …
With 2021 just around the corner, it’s time to wrap up the past year and look at what will define the cloud native industry in the year ahead. We’ve gathered key insights, predictions, and trends for you to explore. Check out the excellent Datadog’s report on real-world container use, the new AWS container security survey, …
Repeat after me: “Kubernetes is not secure by default.” Got that? Good, admitting that is the first step to Kubernetes security wisdom. But, Starboard, an open-source Kubernetes security CLI and operator from Aqua Security can help you understand what’s going on with security in your Kubernetes cluster. In a KubeCon presentation, Liz Rice, Aqua Security’s vice president of open source engineering, …
Containers are really helpful for simplifying the problem of detecting anomalies, especially if you architect your applications using a microservices model. Each container typically performs only a small function and that means the range of normal, expected behaviors is small. For example, it’s often true that you only expect to see one specific executable running …
“While DevOps processes and infrastructure-as-code have advanced the cause of a standard operating environment for servers, it is with containers, along with serverless functions, that the promise of a truly uniform operating environment can be achieved,” says Tsvi Korren, field CTO at Aqua Security. Containers, Korren notes, can be built to be standard at scale: “Not …
Fortunately, most of the instances involving container security breaches today involve what often are viewed as nuanced attacks involving cryptojacking. According to a recent report published by Aqua Security, 95% of the container images it discovered had been compromised were designed to hijack resources for the sole purpose of cryptocurrency mining. Cryptojacking may be considered the …
For many, November is a month of politics, for others – a time for giving thanks, for us in the cloud native ecosystem it’s a month of Kubernetes. We just introduced major new capabilities in our K8s security solution – Kubernetes Security Posture Management (KSPM) that helps protect your K8s clusters against multiple threats. Before diving in, …