K8s Security

What is the difference between a root process and a containerized root process?

To answer this question, let’s first look at some history. Processes are software instances running...

Harden workloads with zero disruption

Secure Kubernetes environments without disrupting applications

Kubernetes 1.30: A Security Perspective

Kubernetes 1.30 marks a significant milestone in the evolution of the widely used orchestration platform,...

What it takes to do Cloud Detection & Response

Why Current Solutions Fall Short in Cloud Detection & Response The shift to cloud has...

Seccomp internals deep dive – Part 1

Seccomp, short for Secure Computing Mode, is a noteworthy tool offered by the Linux kernel....

Bombshell in SSH servers! What CVE-2024-3094 means for Kubernetes users

Read our update: Yet another reason why the xz backdoor is a sneaky b@$tard On...

Are you looking for vulnerabilities in the right places?

With the rapid pace of technological evolution, ensuring security within the systems we operate and...

Why context matters in Kubernetes security 

Background There are things in the world that are absolute, and there are things that...

The Future of Kubernetes Network Policy

Introduction In the ever-changing world of Kubernetes security, it’s crucial to stay ahead of threats...

The Kubernetes network policies you need today 

In the dynamic world of Kubernetes, container orchestration is just the tip of the iceberg....

Introducing Runtime-based Vulnerability Management – turning vulnerability data into actionable intelligence 

Struggling to manage vulnerabilities in your Kubernetes environment? You’re not alone. Traditional vulnerability management tools...

Beyond the noise: runtime-based vulnerability management for effective threat control

Introduction In an ideal world, patching every vulnerability before attackers discover them would be a...

slack_logos Continue to Slack

Get the information you need directly from our experts!

new-messageContinue as a guest