Securing the software supply chain, with Kim Lewandowski: Lock and Code S03E13
At the start of the global coronavirus pandemic, nearly everyone was forced to learn about the “supply chain.” Immediate stockpiling by …
At the start of the global coronavirus pandemic, nearly everyone was forced to learn about the “supply chain.” Immediate stockpiling by …
In this article, I will discuss how to detect Log4j vulnerability using Red Hat Advanced Cluster Security or ACS, which will help you to …
Cloud adoption and industry transformation are accelerating as the world looks for efficiency. Let’s face it, 2022 promises to be another …
With the increasing adoption of cloud-native principles, tools and platforms, security risks also increase, but they can be mitigated using …
Security professionals are challenged with securing physical devices, networks, cloud, BYOD, IOT and against internal and external threats. …
This blog post will show you how to use one central oauth2-proxy as authentication proxy for multiple services inside your Kubernetes …
The Ubuntu in the wild blog post ropes in the latest highlights about Ubuntu and Canonical around the world on a bi-weekly basis. It is a …
This week, we take a look at the security issues in cheap video doorbells and security cameras, as well as tutorials and webinars on …
KubeCon + CloudNativeCon and Prisma from Palo Alto Networks sponsored this post, in anticipation of the virtual KubeCon + CloudNativeCon …
As Kubernetes grows in popularity, it has attracted the attention of more security researchers, who probe the software looking for …
A few years back, Kubernetes was in full development and many of its basic concepts were still evolving, so security was not a huge …
Kubernetes security is an issue for many organizations. In a 2020 report covered by TechRepublic, 94% of respondents revealed that their …
Securing a container platform is a multi-step process spanning from development to production. The process of securing containers is …
Earlier this year hackers were able to exploit container platform Kubernetes to install cryptomining software in Microsoft Azure. Fei …