Avatar photo
By: Giang Pham

December 10, 2024 6:36 pm

225 views

How To Advance Container Network Security in Kubernetes

As enterprises work to innovate quickly and adapt to rapidly changing demands, they’ve come to rely heavily on containers. Container technology offers the flexibility, efficiency and scalability needed for the modern IT infrastructure.  However, the shift from traditional perimeter security to network security within Kubernetes clusters has given rise to new challenges. Securing […]

Read More


Avatar photo
By: Ivan Tarin

October 31, 2024 9:43 pm

556 views

Integrating Zero Trust Container Security in CI/CD Pipelines: Best Practices and Tools

Containers have been a massive step forward for cloud native applications, ensuring companies can reduce the impact on end users while keeping new features, bug fixes and patches continuously up to date on a far more efficient infrastructure. At the same time, the fast-paced nature of CI/CD pipelines into containers, while great for agility, also […]

Read More


Avatar photo
By: Ivan Tarin

October 29, 2024 6:27 pm

524 views

Strengthening Cloud Native Security: A Deep Dive Into Container Runtime Protection

As organizations shift towards cloud native architectures, containers have become the backbone of agile application deployment and resource management. However, the shift has introduced new security challenges, particularly in the runtime phase (when containers execute their operations).  The container runtime phase is arguably the most vulnerable stage of a container’s lifecycle, where the […]

Read More


Avatar photo
By: Ivan Tarin

October 17, 2024 6:22 pm

483 views

Take a Unified Approach to Zero Trust and Network Visibility in Cloud Native Environments

The potential advantages of cloud native applications and environments include the ability to scale massively and increase deployment speeds from multiple times a year to multiple times a day. However, those same benefits also create new considerations for security: how do you keep thousands or hundreds of thousands of apps or services secure? Take autoscaling […]

Read More


Avatar photo
By: Ivan Tarin

September 20, 2024 6:14 pm

1,232 views

Enterprise Container Management Best Practices: Case Studies and Lessons Learned

Containers are a powerful tool that empower enterprises’ cloud native modernization. Containerized workloads offer unprecedented agility and scalability, but running them on an enterprise scale introduces unique complexities. Enterprise container management solutions lower the barriers to entry and allow more enterprises to innovate and modernize with container systems like Kubernetes. Tools like these allow companies […]

Read More


Avatar photo
By: Ivan Tarin

June 20, 2024 6:41 pm

2,599 views

NeuVector Prime Wins Fortress Cybersecurity Award, Named Leader in Zero Trust Security

Zero trust security is a crucial strategy in today's rapidly evolving digital landscape. NeuVector Prime was recently honored as a leader in zero trust security, winning the 2024 Fortress Cybersecurity Award in the Zero Trust category. This honor highlights NeuVector Prime’s innovation in zero trust strategies that meet the needs of a changing security […]

Read More


Avatar photo
By: Fei Huang

June 12, 2024 8:38 pm

1,192 views

Understanding and Addressing AI Security Risks

In the digital age, Artificial Intelligence (AI) stands as one of the most transformative technologies, reshaping industries, economies, and even the ways we interact with the world. From enhancing healthcare diagnostics to optimizing supply chain logistics, AI's potential seems boundless. However, amidst the promises of progress, lurk shadows of security risks that demand our attention. […]

Read More


Avatar photo
By: Abby Costin

May 21, 2024 4:38 pm

3,935 views

How to Protect Against Kubernetes Attacks with the SUSE Container Security Platform

What are common challenges with Kubernetes and container security? The rise of containers and Kubernetes has transformed application development, allowing businesses to deploy modern apps with unprecedented speed and agility. However, this shift to containerized infrastructure presents a new security landscape with challenges. Unlike traditional applications, containers have expanded attack surface – more potential entry […]

Read More


Avatar photo
By: Glen Kosaka

April 3, 2024 1:56 pm

4,241 views

How NeuVector Can Protect Against the XZ Backdoor Attack CVE-2024-3094 in Kubernetes Environments

Security researcher Andres Freund reported to Debian that the xz/liblzma library had been backdoored. As a result, CVE-2024-3094 was published with a critical CVSS score of 10. This vulnerability stems from a supply chain compromise on versions 5.6.0 and 5.6.1 of XZ Utils. XZ Utils is data compression software included in […]

Read More