Kubernetes Security
Kubernetes Security: Navigating the Cybersecurity Pitfalls
Nik Hewitt | | Best Practices, Cloud, Kubernetes Security, lateral movement, microsegmentation, next gen security, Security Research
By default, Kubernetes security lack controls, and any pod can talk freely to any other pod… Kubernetes has taken the tech industry by storm, earning justified accolades for its power in orchestrating ...
Why CNAPP is the Future of Cloud Protection
Ryan C. Smith | | Container Security, Kubernetes, Kubernetes Security, Multicloud Security, Security Observability, Serverless Security, ThreatMapper, ThreatStryker, Vulnerability Management
As more organizations move to the cloud, there is a growing need for cloud security solutions that can keep up with the constantly evolving threat landscape. Traditional security solutions, such as firewalls ...
The Power of Open-Source Security: A Deep Dive
Sandeep Lahane | | Container Security, Kubernetes, Kubernetes Security, open source, OSS security, runtime protection, Security Observability, use case
Open-source software (OSS) is increasingly becoming foundational to security strategies for cutting-edge security teams. In a recent webinar hosted by Sandeep Lahane, co-founder and CEO of Deepfence, Nick Reva, Snap’s Head of ...
Runtime Security Observability for Containerized Workloads in AWS
Sandeep Lahane | | Container Security, Kubernetes Security, Security Observability, Serverless Security
Recently we asked thought leaders from cutting-edge security teams to share their best practices for detecting and responding to threats in incredibly complex cloud environments. Here are some highlights from our most ...
The Importance of CNAPP in Cloud Security and Key Differences Between Platforms
Ryan Smith | | Cloud Security, cnapp, Container Security, Kubernetes Security, Multicloud Security, Vulnerability Management
With the blistering adoption of the cloud, combined with increased complexity due to multi-hybrid and SaaS architecture, and the exploding use of containers, serverless and other forms of cloud-native architectures, we need ...
Identification and Classification of Crypto-Malware Using ThreatMapper
Shyam Krishnaswamy | | Container Security, Kubernetes Security, Malware, ThreatMapper, Vulnerability Management, yarahunter
In addition to classifying malware, the sensors deployed as a part of ThreatMapper provide useful runtime context, which is used to automatically prioritize the malware that needs immediate attention. The post Identification ...
Aya: your tRusty eBPF companion
Michal Rostecki and Thomas Legris | | aya, Community News, Container Security, deep packet inspection, eBPF, Kubernetes Security, ThreatStryker
Aya is a library that makes it possible to write eBPF programs fully in Rust and is focused on providing an experience that is as friendly as possible for developers. In this ...
Exploiting Authentication in AWS IAM Authenticator for Kubernetes
Amazon Elastic Kubernetes Service (Amazon EKS) is a managed service that helps you to create, operate, and maintain Kubernetes clusters. Amazon EKS has several deployment options including AWS cloud and on-premises (Amazon ...
Deepfence FAQ – June 2022
Jamie Gale | | Container Security, Deepfence Cloud, events, faq, Kubernetes, Kubernetes Security, Multicloud Security, open source, ThreatMapper, ThreatStryker, Vulnerability Management
Welcome to our first FAQ blog post where we recap popular questions we’ve received along with the answers to them. What is the inspiration for this particular post? While on the road ...
What a Week! KubeCon + CloudNativeCon Europe 2022
Jamie Gale | | awards, Container Security, DeepfenceCloud, events, Kubernetes, Kubernetes Security, open source, runtime protection, ThreatMapper, ThreatStryker
This year’s KubeCon + CloudNativeCon Europe was an incredible, electrifying event! We hope you had as much fun engaging with new people and ideas as we did. In this post, we’ll share ...