K8s Security

Cryptominers in the Cloud

Over the past decade, Bitcoin’s value has increased more than 200-fold. Similarly, other cryptocurrencies have...

NEW: ARMO Platform Introduces Auto-Generation of Seccomp Profiles

We are thrilled to announce the latest enhancement to ARMO Platform: Seccomp Profiles Leveraging eBPF....

Runtime anomaly detection in Kubernetes: enhancing security through context-aware profiling

Runtime anomaly detection is fast becoming a critical component for protecting containerized environments. Recent advancements...

Unraveling the State of Kubernetes Security in 2024

We explored the Red Hat State of Kubernetes security report 2024, one of our favorite...

Why Kubernetes doesn’t manage users?

Kubernetes stands at the forefront of the container orchestration revolution by becoming most people’s go-to...

eBPF use cases

What is eBPF and how can it be used within the Kubernetes environment? In the...

The Kubernetes gap in CNAPP – exploring why many CNAPPs have a Kubernetes gap

A guest post by James Berthoty, founder of Latio. CSPMs and CNAPP have a major...

regreSSHion: RCE Vulnerability in OpenSSH Server (CVE-2024-6387)

A high-severity remote code execution (RCE) vulnerability has been found in OpenSSH’s server (CVE-2024-6387) by...

Reverse engineering eBPF programs

eBPF is one of the most widely used technologies in today’s computing ecosystem, starting from...

Leveraging Golden Signals for Enhanced Kubernetes Security

As a powerful and widely adopted open-source platform, the complexity of Kubernetes is not to...

Seccomp for Kubernetes workloads

Seccomp in a nutshell Seccomp, short for Secure Computing Mode, is a security feature in...

What is the difference between a root process and a containerized root process?

To answer this question, let’s first look at some history. Processes are software instances running...

slack_logos

Continue to Slack

Get the information you need directly from our experts!

new-messageContinue as a guest