Please turn on your JavaScript for this page to function normally.
HITB trainings
Cybersecurity training: Learn how to secure containerized environments

Driven by a strong curiosity to know how computers and computer programs are made, how they work, and how safe they are, Sheila A. Berta, Head of Security Research at Dreamlab …

GitHub
GitHub envisions a world with fewer software vulnerabilities

After five months in beta, the GitHub Code Scanning security feature has been made generally available to all users: for free for public repositories, as a paid option for …

container
Challenges and drivers influencing container infrastructure backup and recovery

As containers continue to rise in popularity, organizations need to understand that they are uniquely designed and consequently require a specialized data protection strategy. …

Attacks growing in both scope and sophistication, exposing gaps in the cloud native toolchain

There’s a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure, according to Aqua Security. While most attacks were aimed …

error
Updated cryptojacking worm steals AWS credentials

A malicious cryptocurrency miner and DDoS worm that has been targeting Docker systems for months now also steals Amazon Web Services (AWS) credentials. What’s more, …

connection
Everyone’s talking about microservices, who’s actually doing it?

77% of organizations have adopted microservices, with 92% experiencing success with microservices, according to an O’Reilly survey. Teams who own the software lifecycle …

Snyk
New vulnerabilities in open source packages down 20% compared to last year

New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, …

cloud
Organizations look to build resiliency with hybrid and multi-cloud architectures

Hybrid and multi-cloud architectures have become the de-facto standard among organizations, with 53 percent embracing them as the most popular form of deployment. Advantages …

cloud storage
Enterprises regard the cloud as critical for innovation, but struggle with security

Most enterprises (85%) believe embracing the public cloud is critical to fuel innovation, but the majority are not equipped to operate in the cloud securely, according to a …

code
You are focusing too much on vulnerabilities that pose little danger

Only half of the vulnerabilities in cloud containers ever posed a threat, according to a Rezilion study. The top 20 most popular container images on DockerHub were analyzed to …

Kubernetes
Techniques and strategies to overcome Kubernetes security challenges

Five security best practices for DevOps and development professionals managing Kubernetes deployments have been introduced by Portshift. Integrating these security measures …

containers
Container usage has grown in complexity, specific security controls are needed

Container usage has grown in scale and complexity, and doubled in density, according to Sysdig. As container technologies continue to transform how organizations deliver …

Don't miss

Cybersecurity news