“Operators can simplify how you run Kubernetes applications, removing the complexity of managing the nuts and bolts of Kubernetes, and allowing you to do so in a repeatable manner,” says Amir Jerbi, CTO at Aqua Security.
Serverless and containerizations trends, post-Kubernetes open-source computing, Container Sandboxing, Datadog and Container Security, Tech comparisons resources and more.
Traditional security tools cannot handle the velocity, scale, and dynamic networking capabilities of containers. Taking this a step further, serverless functions prioritize simplicity and agility by abstracting infrastructure concerns to provide a simple execution environment for applications and microservices. Attackers may leverage a vulnerability in base images used for containers, outsourced libraries or in serverless […]
More businesses need a “shift left” mentality to move security to the start of the development and build process and test for vulnerabilities earlier, according to Liz Rice, technology evangelist for Aqua Security. If there is a problem with one of the dependencies, a developer can be notified earlier instead of waiting until the end of […]
It is a reality that more enterprises are deploying containers and other tools to help build and ship applications faster – solutions designed to be easy-to-use and to improve developer agility – not with production deployments and associated security requirements in mind. Aqua’s view is right there with my own – a solution is not […]
As Kubernetes is leveraged as the foundation for an increasing number of critical enterprise technologies and enables the new industry standard of hybrid cloud, open-source participants are reckoning with both the challenge and opportunity of working within a new collaborative digital economy. “The scale is coming from real adoption and businesses that are moving their applications […]
Some questions and concerns discussed in this podcast: If security needs to “Shift Left”, what can devs do to accommodate the change? Why do we need security as far left? Automation: How does security that solves security issues? Do Microservices solve everything? What don’t they solve? What does security need to embrace to make the […]
One of the most significant issues cybersecurity teams must come to terms with in 2019 is how container security should be implemented and maintained. The days when cybersecurity teams were solely responsible for implementing cybersecurity controls are long past. In fact, as cybersecurity becomes more distributed across the enterprise, the way cybersecurity metrics are consumed […]