With 2021 just around the corner, it’s time to wrap up the past year and look at what will define the cloud native industry in the year ahead. We’ve gathered key insights, predictions, and trends for you to explore. Check out the excellent Datadog’s report on real-world container use, the new AWS container security survey, …
Repeat after me: “Kubernetes is not secure by default.” Got that? Good, admitting that is the first step to Kubernetes security wisdom. But, Starboard, an open-source Kubernetes security CLI and operator from Aqua Security can help you understand what’s going on with security in your Kubernetes cluster. In a KubeCon presentation, Liz Rice, Aqua Security’s vice president of open source engineering, …
Containers are really helpful for simplifying the problem of detecting anomalies, especially if you architect your applications using a microservices model. Each container typically performs only a small function and that means the range of normal, expected behaviors is small. For example, it’s often true that you only expect to see one specific executable running …
“While DevOps processes and infrastructure-as-code have advanced the cause of a standard operating environment for servers, it is with containers, along with serverless functions, that the promise of a truly uniform operating environment can be achieved,” says Tsvi Korren, field CTO at Aqua Security. Containers, Korren notes, can be built to be standard at scale: “Not …
Fortunately, most of the instances involving container security breaches today involve what often are viewed as nuanced attacks involving cryptojacking. According to a recent report published by Aqua Security, 95% of the container images it discovered had been compromised were designed to hijack resources for the sole purpose of cryptocurrency mining. Cryptojacking may be considered the …
For many, November is a month of politics, for others – a time for giving thanks, for us in the cloud native ecosystem it’s a month of Kubernetes. We just introduced major new capabilities in our K8s security solution – Kubernetes Security Posture Management (KSPM) that helps protect your K8s clusters against multiple threats. Before diving in, …
Twenty years ago, the idea that people would be able to work remotely from their laptop or mobile device, able to access all their files, and collaborate in real-time would have been unthinkable. It goes without saying that technology has advanced very quickly and continues to do so. While this is wonderful for users, it …
“When a security incident is identified, organizations need to contain the damage, preserve evidence, and restore business functions. As many previous incidents show, there is mayhem in the initial hours of responding to an ongoing attack, from identifying the significance of a threat to considering the tradeoffs between containment and business disruption. The idea behind …