Kubernetes Security: Navigating the Cybersecurity Pitfalls

By default, Kubernetes security lack controls, and any pod can talk freely to any other pod… Kubernetes has taken the tech industry by storm, earning justified accolades for its power in orchestrating ...
Why CNAPP is the Future of Cloud Protection

Why CNAPP is the Future of Cloud Protection

As more organizations move to the cloud, there is a growing need for cloud security solutions that can keep up with the constantly evolving threat landscape. Traditional security solutions, such as firewalls ...
How Top Security Teams Leverage Open Source: Nick Reva at Snap on OSS

The Power of Open-Source Security: A Deep Dive

Open-source software (OSS) is increasingly becoming foundational to security strategies for cutting-edge security teams. In a recent webinar hosted by Sandeep Lahane, co-founder and CEO of Deepfence, Nick Reva, Snap’s Head of ...
Runtime Security Observability for Containerized Workloads in AWS with Deepfence - Question 1

Runtime Security Observability for Containerized Workloads in AWS

Recently we asked thought leaders from cutting-edge security teams to share their best practices for detecting and responding to threats in incredibly complex cloud environments. Here are some highlights from our most ...

The Importance of CNAPP in Cloud Security and Key Differences Between Platforms

With the blistering adoption of the cloud, combined with increased complexity due to multi-hybrid and SaaS architecture, and the exploding use of containers, serverless and other forms of cloud-native architectures, we need ...
 Cobalt strike malware

Identification and Classification of Crypto-Malware Using ThreatMapper

In addition to classifying malware, the sensors deployed as a part of ThreatMapper provide useful runtime context, which is used to automatically prioritize the malware that needs immediate attention. The post Identification ...
Aya: your tRusty eBPF companion

Aya: your tRusty eBPF companion

Aya is a library that makes it possible to write eBPF programs fully in Rust and is focused on providing an experience that is as friendly as possible for developers. In this ...
Exploiting Authentication in AWS IAM Authenticator for Kubernetes

Exploiting Authentication in AWS IAM Authenticator for Kubernetes

Amazon Elastic Kubernetes Service (Amazon EKS) is a managed service that helps you to create, operate, and maintain Kubernetes clusters. Amazon EKS has several deployment options including AWS cloud and on-premises (Amazon ...

Deepfence FAQ – June 2022

Welcome to our first FAQ blog post where we recap popular questions we’ve received along with the answers to them. What is the inspiration for this particular post? While on the road ...
Owen Garrett, Deepfence | Kubecon + Cloudnativecon Europe 2022

What a Week! KubeCon + CloudNativeCon Europe 2022

This year’s KubeCon + CloudNativeCon Europe was an incredible, electrifying event! We hope you had as much fun engaging with new people and ideas as we did. In this post, we’ll share ...