Please turn on your JavaScript for this page to function normally.
containers
Big data moving to Kubernetes with speed, complexities arising

Pepperdata announced the results of a new survey to gauge the pace at which enterprises are migrating big data applications to Kubernetes containers. 600 senior enterprise IT …

innovation
Top cybersecurity threats enterprises will face in 2022

McAfee and FireEye released its 2022 Threat Predictions, examining the top cybersecurity threats they predict enterprises will face in 2022. Bad actors have taken note of …

containers
Enterprises increasingly adopting containers, many turning to providers for support

U.S. enterprises increasingly are adopting containers to streamline their applications workflows, with many turning to container services and solutions providers to help them …

ThreatMapper
ThreatMapper: Open source platform for scanning runtime environments

Deepfence announced open source availability of ThreatMapper, a signature offering that automatically scans, maps and ranks application vulnerabilities across serverless, …

Kubernetes
IT executives do not believe their business can have both a flexible and usable Kubernetes environment

A Dimensional Research survey shares Kubernetes best practices and key insights about the rapidly growing and evolving use of Kubernetes within businesses. The findings of the …

containers
How do I select a container security solution for my business?

The adoption of container architectures is growing steadily, but security and compliance remain top concerns for enterprises, a recent survey revealed. To select a suitable …

Kubescape
Kubescape helps admins manage Kubernetes securely

Kubescape is an open-source tool for testing if Kubernetes is deployed securely, as defined in the recently released Kubernetes Hardening Guidance by NSA and CISA. About …

container
Security and compliance still a challenge for container architectures

While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …

application
A digital shift requires a new approach to asset management: How to reduce security risks

The global pandemic forced organizations to rapidly accelerate their digital transformation. As a result, nearly overnight, companies spanning all sizes and sectors deployed …

container
The knowledge gap around runtime security and the associated risks

According to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating …

container
It takes less than one hour to exploit vulnerable container infrastructure

Aqua Security published a research revealing a continued rise in cyberattacks targeting container infrastructure and supply chains, and showing that it can now take less than …

lock
Higher encryption adoption driven by rising data breach threats

Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use …

Don't miss

Cybersecurity news