K8s Security

Kubescape brings a new level of security to Charmed Kubernetes

Guest post originally published on Canonical’s Ubunto blog by Alex Jones. The popular open-source platform Kubescape by ARMO has...

Comparing the Leading Tools That Scan Against the CIS Kubernetes Benchmark Framework

CIS Benchmarks are a focused set of guidelines for the secure configuration, vulnerability detection, and...

Kubernetes Security: CSPM’s Blind Spot

This article focuses on a critical missing component of Cloud Security Posture Management (CSPM): visibility...

What is RCE in Kubernetes?

A detailed overview of the Remote Code Execution (RCE) attacks, how it affects the Kubernetes...

2022 Kubernetes Vulnerabilities – Main Takeaways 

All the main K8s vulnerabilities from 2022 consolidated into one article. Read all about it...

The State of Kubernetes {Open-Source} Security

A first of its kind survey looks at the relationship between open-source and K8s security....

Kubescape adds CIS benchmark, boosting security and compliance scanning 

Kubescape can now automatically scan Kubernetes clusters against the Center for Internet Security (CIS) benchmark,...

CI/CD Security: How to Keep your CI/CD Pipelines Secure

The tech sector is expanding aggressively. And for businesses and services, keeping up with this...

Securing CI/CD Pipelines Through Security Gates with Kubescape 

As security becoming a more pressing matter and while at the same time as application...

NSA & CISA Kubernetes Hardening Guide – what is new with version 1.2

In August 2022, NSA & CISA has issued a new version of the Kubernetes Hardening Guide – version...

How to Secure and Protect Your Kubernetes Cluster?

Kubernetes is the de-facto container management platform of today and the future. It has increased...

Over 900,000 Kubernetes instances were found exposed online

Check your Kubernetes clusters are properly configured to withstand unauthorized external access attempts with Kubescape...