Tag: Containers (Cloud Computing)
-
How to investigate and take action on security issues in Amazon EKS clusters with Amazon Detective – Part 2
AWS Security Blog How to investigate and take action on security issues in Amazon EKS clusters with Amazon Detective – Part 2 In part 1 …
-
How to detect security issues in Amazon EKS clusters using Amazon GuardDuty – Part 1
In this two-part blog post, we’ll discuss how to detect and investigate security issues in an Amazon Elastic Kubernetes Service (Amazon …
-
Use Amazon Inspector to manage your build and deploy pipelines for containerized applications
AWS Security Blog Use Amazon Inspector to manage your build and deploy pipelines for containerized applications Amazon Inspector is an …
-
AWS Adds Container Lens to Well-Architected Framework
AWS has added a new container lens to its Well-Architected Framework. This new technical paper outlines best practices sourced from the …
-
Google Distroless Images Achieve SLSA Level 2
Google announced that their distroless builds meet level 2 of the Supply chain Levels for Software Artifacts (SLSA). Level 2 requires that …
-
Undistro Wolfi Designed to Mitigate Software Supply Chain Risk
Chainguard has announced the general availability of Wolfi, a new Linux distribution designed for container environments and built to …
-
Cloud Native Security Hasn’t Solved Compliance Challenges
Modern, cloud-based, distributed networks may lack a defined perimeter to protect, but they still need network security. And nearly all …
-
OAuth Security in a Cloud Native World
These days most software companies use cloud deployment with modern hosting capabilities that make everyone productive, from developers to …
-
How to use new Amazon GuardDuty EKS Protection findings
If you run container workloads that use Amazon Elastic Kubernetes Service (Amazon EKS), Amazon GuardDuty now has added support that will …
-
Deep Dive: Protecting Against Container Threats in the Cloud
Containers are self-contained pods representing complete, portable application environments. They contain everything an application needs …
-
Bug in the Linux Kernel Allows Privilege Escalation, Container Escape
A missing check allows unprivileged attackers to escape containers and execute arbitrary commands in the …
-
Article: Is Docker Secure Enough?
Docker is a platform most developers are now familiar with. It makes it easier to create, deploy and run your applications in packages …
●●●