Traditional security tools cannot handle the velocity, scale, and dynamic networking capabilities of containers. Taking this a step further, serverless functions prioritize simplicity and agility by abstracting infrastructure concerns to provide a simple execution environment for applications and microservices. Attackers may leverage a vulnerability in base images used for containers, outsourced libraries or in serverless …
More businesses need a “shift left” mentality to move security to the start of the development and build process and test for vulnerabilities earlier, according to Liz Rice, technology evangelist for Aqua Security. If there is a problem with one of the dependencies, a developer can be notified earlier instead of waiting until the end of …
It is a reality that more enterprises are deploying containers and other tools to help build and ship applications faster – solutions designed to be easy-to-use and to improve developer agility – not with production deployments and associated security requirements in mind. Aqua’s view is right there with my own – a solution is not …
As Kubernetes is leveraged as the foundation for an increasing number of critical enterprise technologies and enables the new industry standard of hybrid cloud, open-source participants are reckoning with both the challenge and opportunity of working within a new collaborative digital economy. “The scale is coming from real adoption and businesses that are moving their applications …
Some questions and concerns discussed in this podcast: If security needs to “Shift Left”, what can devs do to accommodate the change? Why do we need security as far left? Automation: How does security that solves security issues? Do Microservices solve everything? What don’t they solve? What does security need to embrace to make the …
One of the most significant issues cybersecurity teams must come to terms with in 2019 is how container security should be implemented and maintained. The days when cybersecurity teams were solely responsible for implementing cybersecurity controls are long past. In fact, as cybersecurity becomes more distributed across the enterprise, the way cybersecurity metrics are consumed …
As Kubernetes’ star rises, it becomes a more interesting target for bad guys. “The rapid rise in adoption of Kubernetes is likely to uncover gaps that previously went unnoticed on the one hand, and on the other hand gain more attention from bad actors due to a higher profile,” says Amir Jerbi, CTO at Aqua Security.
“There’s a very basic understanding of cloud native needed at that level,” adds Liz Rice, Technology Evangelist at Aqua Security. “They don’t need a huge level of technical knowledge, we just need to get the terminology and awareness into the boardroom,” she notes.