Avatar photo
By: Glen Kosaka

December 12, 2021 1:29 pm

3,216 views

Critical Vulnerability in Apache Log4j 2 (CVE-2021-44228)

A critical, high severity vulnerability (CVSS v3.0 10/10 rating) in the Apache Log4j open source Java logging library was disclosed Thursday, December 9 on the foundation’s github page. On Wednesday, Dec 15 a new vulnerability CVE-2021-45046 was published and patched, according to this article. This was the result of an incomplete initial patch […]

Read More


Avatar photo
By: Glen Kosaka

March 12, 2019 11:28 am

2,254 views

Container Segmentation Strategies and Patterns

At a recent container security conference the topic of ‘container segmentation patterns’ came up, and it became clear that many security architects are wrestling with how to best segment workload communication in the dynamic environment of containers. The question was also raised “Is the DMZ dead?” The concept of network segmentation has […]

Read More


Avatar photo
By: Glen Kosaka

September 13, 2018 11:52 am

6,391 views

How Kubernetes Networking Works – Under the Hood

  By Tobias Gurtzick Kubernetes networking is a complex topic, if not even the most complicated topic. This post will give you insight on how kubernetes actually creates networks and also how to setup a network for a kubernetes cluster yourself. This article doesn’t cover how to setup a kubernetes cluster itself, you […]

Read More


Avatar photo
By: Glen Kosaka

April 18, 2018 12:17 pm

2,710 views

How Kubernetes Networking Works – The Basics

Kubernetes 101 Before I get into Kubernetes networking, here are the basic concepts to know about in Kubernetes. For those not familiar with Kubernetes, these are the objects and terms used in a Kubernetes deployment. Kubernetes is a container orchestration and management tool for automating the deployment and monitoring of containers. Kubernetes is supported by […]

Read More


Avatar photo
By: Glen Kosaka

March 22, 2018 12:28 pm

812 views

Kubernetes System Security – Protecting Against Kubelet Exploits

By Andson Tung As critical as it is to protect application containers deployed by Kubernetes, it is just as critical to protect the Kubernetes system containers from attacks or from being used in an attack. In this post I’ll focus on one important Kubernetes security area – protecting the Kubelet, which manages the pods […]

Read More


Avatar photo
By: Neuvector

September 13, 2017 12:45 pm

3,219 views

Web Application Firewall vs. Container Firewall

How is a Container Firewall Different Than a Web Application Firewall? By Gary Duan Application containers provide an efficient way to deploy and manage applications, including web facing ones. But with containerization, securing applications has become even more challenging. I often get asked for the comparison of a web application firewall vs. container firewall. I […]

Read More


Avatar photo
By: Neuvector

September 8, 2017 2:47 pm

1,779 views

Next Generation Firewall vs. Container Firewall

What’s a Container Firewall? And how is it different than a Next Generation Firewall? By Gary Duan Containers and microservices are revolutionizing computing. But can firewalls help secure these? Next Generation Firewalls (NGFW) were supposed to handle the latest threats and data center designs, but fall short in the new cloud microservices environments. Here’[…]

Read More


Avatar photo
By: Glen Kosaka

July 19, 2017 2:55 pm

1,070 views

How to Secure Docker Networking for Access to External Networks and Applications

Getting container visibility and security for docker networking can be a challenge even for a pure container based application stack, or cluster. For most enterprises this challenge can be even tougher when trying to secure a hybrid environment with both container and non-container applications. Many enterprises are in the midst of migration projects to a […]

Read More


Avatar photo
By: Neuvector

January 5, 2017 3:01 pm

3,169 views

How Docker Swarm Container Networking Works – Under the Hood

By Gary Duan, CTO, NeuVector Docker 1.12 is a release loaded with a lot of great features. With built-in orchestration and by removing dependencies on the external KV store, Docker Swarm allows DevOps to quickly deploy a multi-host docker cluster that “just works.” Although not without controversies, when compared to Kubernetes, Docker […]

Read More