K8s Security

What it takes to do Cloud Detection & Response

A guest post by James Berthoty the founder of Latio Tech. The shift to cloud...

Seccomp internals deep dive – Part 1

Seccomp, short for Secure Computing Mode, is a noteworthy tool offered by the Linux kernel....

Bombshell in SSH servers! What CVE-2024-3094 means for Kubernetes users

Read our update: Yet another reason why the xz backdoor is a sneaky b@$tard On...

Kubernetes 1.30: A Security Perspective

Kubernetes 1.30 marks a significant milestone in the evolution of the widely used orchestration platform,...

The missing piece in image scanning

The missing piece in image scanning

Introduction In the dynamic landscape of cloud-native cybersecurity, image scanning has become essential to ensuring...

The Future of Kubernetes Network Policy

Introduction In the ever-changing world of Kubernetes security, it’s crucial to stay ahead of threats...

The Kubernetes network policies you need today 

In the dynamic world of Kubernetes, container orchestration is just the tip of the iceberg....

Introducing Runtime-based Vulnerability Management – turning vulnerability data into actionable intelligence 

Struggling to manage vulnerabilities in your Kubernetes environment? You’re not alone. Traditional vulnerability management tools...

Beyond the noise: runtime-based vulnerability management for effective threat control

Introduction In an ideal world, patching every vulnerability before attackers discover them would be a...

Top Kubernetes Security Tools in 2024

Explore the essential Kubernetes security tools that detect misconfigurations, vulnerabilities, and enforce best practices to...

Kubernetes security best practices

Kubernetes Security Best Practices for Security Professionals

Navigating the complexities of Kubernetes security As containerized applications become the norm, the complexities of...

Shield GKE’s Achilles Heel using RBAC

If you’re using GKE (Google Kubernetes Engine), you should be extremely cautious when adding roles...