K8s Security

The Kubernetes gap in CNAPP – exploring why many CNAPPs have a Kubernetes gap

A guest post by James Berthoty, founder of Latio. CSPMs and CNAPP have a major...

regreSSHion: RCE Vulnerability in OpenSSH Server (CVE-2024-6387)

A high-severity remote code execution (RCE) vulnerability has been found in OpenSSH’s server (CVE-2024-6387) by...

Reverse engineering eBPF programs

eBPF is one of the most widely used technologies in today’s computing ecosystem, starting from...

Leveraging Golden Signals for Enhanced Kubernetes Security

As a powerful and widely adopted open-source platform, the complexity of Kubernetes is not to...

The missing piece in image scanning

The missing piece in image scanning

Introduction In the dynamic landscape of cloud-native cybersecurity, image scanning has become essential to ensuring...

Seccomp for Kubernetes workloads

Seccomp in a nutshell Seccomp, short for Secure Computing Mode, is a security feature in...

What is the difference between a root process and a containerized root process?

To answer this question, let’s first look at some history. Processes are software instances running...

Harden workloads with zero disruption

Secure Kubernetes environments without disrupting applications

What it takes to do Cloud Detection & Response

Why Current Solutions Fall Short in Cloud Detection & Response The shift to cloud has...

Seccomp internals deep dive – Part 1

Seccomp, short for Secure Computing Mode, is a noteworthy tool offered by the Linux kernel....

Top Kubernetes Security Tools in 2024

Explore the essential Kubernetes security tools that detect misconfigurations, vulnerabilities, and enforce best practices to...

Bombshell in SSH servers! What CVE-2024-3094 means for Kubernetes users

Read our update: Yet another reason why the xz backdoor is a sneaky b@$tard On...

slack_logos

Continue to Slack

Get the information you need directly from our experts!

new-messageContinue as a guest