A CIS Kubernetes benchmark exists for each major cloud provider, helping clarify but raising the bar on deploying Kubernetes environments securely

Mastering the Art of Kubernetes Security 

| | Cloud
With Kubernetes’ explosive adoption by the development community comes an urgent need to secure K8s clusters and ensure their compliance effectively The post Mastering the Art of Kubernetes Security  appeared first on ...
Enterprise considerations for implementing data encryption

Enterprise considerations for implementing data encryption

Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to data encryption and enterprises must consider several ...
Wiz multi-cloud, security, CNAPP cloud computing cybersecurity Orca Kubernetes TDIR cloud and container security

Who Owns Security in Multi-Cloud Operations?

The best-kept secret is the one that is never shared. In today’s technology environment, that is even more true. Where organizations used to build and maintain their own technology stacks, now they ...
Security Boulevard
A Totally Cloud-Biased Retrospective of RSAC 2023

A Totally Cloud-Biased Retrospective of RSAC 2023

| | Cloud
I had a bit of a weird moment a few weeks before the RSA Conference. I was grumbling a bit about finishing my slides, which were late due to an agenda change, ...

A Totally Cloud-Biased Retrospective of RSAC 2023

I had a bit of a weird moment a few weeks before the RSA Conference. I was grumbling a bit about finishing my slides, which were late due to an agenda change, ...
The many different “faces” of a cloud workload

Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume

| | Cloud
How to do CWP right to prepare your organization and protect it from the next widespread vulnerability The post Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume appeared ...

Mapping the Changes in the IT/OT Landscape

Nothing in cybersecurity stays still for long  2022 intensified the Digital Transformation in OT (technology that interfaces with the physical world) and Industrial Control Systems (ICS) environments even further. Partially driven by ...
cloud security CloudBolt compromised threats Sonrai cloud data protection

Don’t Get Burned (Out) by Cloud Vulnerabilities

As a cybersecurity professional, vulnerabilities and exploits can be exhausting, never-ending and the bane of your existence. It is hard to prioritize what matters to you and your organization when you are ...
Security Boulevard
Creating an OIDC provider for the EKS cluster in the console

Federating Kubernetes Workloads with Cloud Identities

| | Cloud
Your K8s workloads legitimately need access to sensitive cloud resources – federated identities let you grant it easily and securely The post Federating Kubernetes Workloads with Cloud Identities appeared first on Ermetic ...
Navigating Cloud Security: Why Segregating Environments from Dev to Production is so Important

Navigating Cloud Security: Why Segregating Environments from Dev to Production is so Important

| | Cloud
Segregation in cloud environments is important for security - this post explores why and offers best practice tips for acting on it. The post Navigating Cloud Security: Why Segregating Environments from Dev ...