searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

containers

Get our top stories in your inbox

Most containers are running as root, which increases runtime security risk

January 14, 2021

While container usage reveals organizations are shifting left by scanning images during the build phase, DevOps teams are still leaving their environments open to attack, …

Growth of cloud-native apps and containerization to define 2021

December 4, 2020

Scality announced its data storage predictions for 2021, focusing on the rapid growth rate of cloud-native apps and containerization. According to IDC, by 2023, over 500 …

The challenges of keeping a strong cloud security posture

December 3, 2020

It’s simple – you can’t secure what you can’t see or don’t know about. In this interview, Badri Raghunathan, Director of Product Management for Container and Serverless …

Enterprises embrace Kubernetes, but lack security tools to mitigate risk

November 13, 2020

Businesses increasingly embrace the moving of multiple applications to the cloud using containers and utilize Kubernetes for orchestration, according to Zettaset. However, …

Cybersecurity training: Learn how to secure containerized environments

November 5, 2020

Driven by a strong curiosity to know how computers and computer programs are made, how they work, and how safe they are, Sheila A. Berta, Head of Security Research at Dreamlab …

GitHub envisions a world with fewer software vulnerabilities

October 13, 2020

After five months in beta, the GitHub Code Scanning security feature has been made generally available to all users: for free for public repositories, as a paid option for …

Challenges and drivers influencing container infrastructure backup and recovery

October 1, 2020

As containers continue to rise in popularity, organizations need to understand that they are uniquely designed and consequently require a specialized data protection strategy. …

Attacks growing in both scope and sophistication, exposing gaps in the cloud native toolchain

September 15, 2020

There’s a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure, according to Aqua Security. While most attacks were aimed …

Updated cryptojacking worm steals AWS credentials

August 18, 2020

A malicious cryptocurrency miner and DDoS worm that has been targeting Docker systems for months now also steals Amazon Web Services (AWS) credentials. What’s more, …

Everyone’s talking about microservices, who’s actually doing it?

July 21, 2020

77% of organizations have adopted microservices, with 92% experiencing success with microservices, according to an O’Reilly survey. success with microservices The report …

New vulnerabilities in open source packages down 20% compared to last year

June 29, 2020

New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, …

Organizations look to build resiliency with hybrid and multi-cloud architectures

April 30, 2020

Hybrid and multi-cloud architectures have become the de-facto standard among organizations, with 53 percent embracing them as the most popular form of deployment. Advantages …

Posts navigation

1 2 3
bot

What analytics can unveil about bot mitigation tactics

  • Understanding third-party hacks in the aftermath of the SolarWinds breach
  • Minimizing cyberattacks by managing the lifecycle of non-human workers
Top videoconferencing attacks and security best practices

What's new

week in review

Week in review: Pen testing, Sunspot malware, Microsoft plugs Defender zero-day

gap

Understanding third-party hacks in the aftermath of the SolarWinds breach

email

Phishers count on remotely hosted images to bypass email filters

bot

What analytics can unveil about bot mitigation tactics

Don't miss

bot

What analytics can unveil about bot mitigation tactics

gap

Understanding third-party hacks in the aftermath of the SolarWinds breach

email

Phishers count on remotely hosted images to bypass email filters

bot

Minimizing cyberattacks by managing the lifecycle of non-human workers

containers

Most containers are running as root, which increases runtime security risk

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • Securing the connected home: A joint task for homeowners and their ISP
  • Cybersecurity sales: Do you have what it takes to succeed?
  • How do I select a data control solution for my business?
  • How do I select cyber insurance for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise