Kubernetes Security

CAST AI Automates Kubernetes Security Posture Management to Block Runtime Threats
CAST AI boasts that its Kubernetes automation platform cuts AWS, Azure and Google Cloud Platform costs by more than 50% ...
Security Boulevard
Top Ten NSA and CISA Cloud Security Strategies
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, Kubernetes Security, microsegmentation, next gen security, security, Security Research, TrueFort, zero trust
NSA and CISA release a joint guide outlining ten pivotal cloud security strategies for enterprise In a business world dominated by cloud-based solutions, robust cloud security strategies for cloud environments have never ...
Kubernetes RCE Vulnerability Allows Remote Code Execution
Wajahat Raja | | Akamai, command injection, CVE-2023-5528, CVSS score, Cybersecurity Mitigation, Cybersecurity News, Cybersecurity Vulnerabilities, Kubernetes, Kubernetes Clusters, Kubernetes Exploits, Kubernetes Security, Remote Code Execution (RCE), Tomer Peled, vulnerability discovery, Windows security, YAML Files
Tomer Peled, an Akamai cybersecurity security researcher, recently discovered a Kubernetes RCE vulnerability that allows threat actors to remotely execute code on Windows endpoints. Not only this but the threat actors can ...

The xSPM Trend: Security Posture Management for Everything
Gilad David Maayan | | ASPM, Cloud Security, cspm, Data Security, identity, Kubernetes Security, Software Security
The xSPM trend represents a holistic approach to managing and enhancing the security posture of diverse IT assets ...
Security Boulevard
Google Cloud Patched Privilege Escalation Vulnerability
Rohan Timalsina | | Cyber Threats, Cybersecurity Weaknesses, enterprise security, google cloud, Google Cloud Security, Google Cloud vulnerability, Kubernetes Security, Linux & Open Source News, Privilege Escalation, security patches
Recently, Google Cloud addressed a medium-severity security vulnerability that could potentially be exploited by attackers with access to a Kubernetes cluster. This flaw, discovered and reported by Palo Alto Networks Unit 42, ...
Kubernetes Security: Sensitive Secrets Exposed
Wajahat Raja | | container orchestration, Cyber Threats, Cybersecurity, Cybersecurity News, Docker Hub, Kubernetes Secrets, Kubernetes Security, Risk Mitigation Strategies, Supply Chain Attacks, two-factor-authentication.2fa, Vulnerability Management
Cybersecurity researchers are warning of Kubernetes security issues amid the exposure of configuration secrets. It has been deemed that such exposure could put organizations at risk of supply chain attacks. Researchers believe ...
The Need for Improved Kubernetes Security
Nik Hewitt | | application protection, Cloud, Kubernetes Security, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
Kubernetes security has been in the news this week, highlighting the need for a fresh approach to container protection Cybersecurity practitioners operating in cloud environments are increasingly facing complex security challenges. Last ...
Critical Kubernetes Vulnerabilities: Stay Informed
Wajahat Raja | | Cluster Security, Container Security, Cybersecurity, Cybersecurity News, DevSecOps, Kubernetes Best Practices, Kubernetes Security, powershell, Security Patching, Windows Nodes, YAML Vulnerability
In the ever-changing landscape of cybersecurity, vigilance is crucial, especially when it comes to complicated and frequently used systems like Kubernetes. A trio of high-severity security flaws have just been discovered, posing ...
Kubernetes Security: Navigating the Cybersecurity Pitfalls
Nik Hewitt | | Best Practices, Cloud, Kubernetes Security, lateral movement, microsegmentation, next gen security, Security Research
By default, Kubernetes security lack controls, and any pod can talk freely to any other pod… Kubernetes has taken the tech industry by storm, earning justified accolades for its power in orchestrating ...

Why CNAPP is the Future of Cloud Protection
Ryan C. Smith | | Container Security, Kubernetes, Kubernetes Security, Multicloud Security, Security Observability, Serverless Security, ThreatMapper, ThreatStryker, Vulnerability Management
As more organizations move to the cloud, there is a growing need for cloud security solutions that can keep up with the constantly evolving threat landscape. Traditional security solutions, such as firewalls ...