It is a reality that more enterprises are deploying containers and other tools to help build and ship applications faster – solutions designed to be easy-to-use and to improve developer agility – not with production deployments and associated security requirements in mind. Aqua’s view is right there with my own – a solution is not …
As Kubernetes is leveraged as the foundation for an increasing number of critical enterprise technologies and enables the new industry standard of hybrid cloud, open-source participants are reckoning with both the challenge and opportunity of working within a new collaborative digital economy. “The scale is coming from real adoption and businesses that are moving their applications …
Some questions and concerns discussed in this podcast: If security needs to “Shift Left”, what can devs do to accommodate the change? Why do we need security as far left? Automation: How does security that solves security issues? Do Microservices solve everything? What don’t they solve? What does security need to embrace to make the …
One of the most significant issues cybersecurity teams must come to terms with in 2019 is how container security should be implemented and maintained. The days when cybersecurity teams were solely responsible for implementing cybersecurity controls are long past. In fact, as cybersecurity becomes more distributed across the enterprise, the way cybersecurity metrics are consumed …
As Kubernetes’ star rises, it becomes a more interesting target for bad guys. “The rapid rise in adoption of Kubernetes is likely to uncover gaps that previously went unnoticed on the one hand, and on the other hand gain more attention from bad actors due to a higher profile,” says Amir Jerbi, CTO at Aqua Security.
“There’s a very basic understanding of cloud native needed at that level,” adds Liz Rice, Technology Evangelist at Aqua Security. “They don’t need a huge level of technical knowledge, we just need to get the terminology and awareness into the boardroom,” she notes.
The same goes for containers and containerization orchestration and automation tools like Kubernetes, Amazon ECS, and Docker Swarm. And while some people have previously debated whether serverless technology would take over containerization momentum, the truth is they’re actually complementary, says Rani Osnat, vice president of product marketing at Aqua Security.
Simply deploying containers with a managed service isn’t enough. Container security pros offer their tips to keep Kubernetes deployments safe and secure.