OT, cyberattacks, internet cybersecurity BGP

KubeCon 2023: Securing Software Delivery and Deployment

At KubeCon 2023, Mitch Ashley talks with Gopal Dommety and David Green from OpsMX about securing software delivery and deployment ...
Security Boulevard
Tenable possible sale

KubeCon 2023: Not Your Father’s Tenable

This is not your father's Tenable! Alan Shimel talks with John Tonello from Tenable about the company's past, present and future ...
Security Boulevard
Google AI threat intelligence

KubeCon 2023: Bridging the AppSec Tools Gap

Alan Shimel: Hey everyone, it’s Alan Shimel, Tech Strong TV, and we’re back here live at KubeCon in the windy city of Chicago. It wasn’t that windy out. It was actually pretty ...
Security Boulevard
cloud security, cloud, cloud environment, data privacy, data protection, cloud security teams, security, cloud-native, Palo Alto Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Zero-Trust, the Service Mesh and Linkerd

By now, everyone working in the cloud-native world has probably heard something about “zero-trust”. It’s a ubiquitous buzzword: Even the White House is getting in on the action, and the buzz has ...
Security Boulevard
monitoring, observability, process monitoring Barracuda Open XDR monitoring DNS threat

Process Monitoring: Detect Malicious Behavior in Your Containers

The default pod provisioning mechanism in Kubernetes has a substantial attack surface, making it susceptible to malevolent exploits and container breakouts. To achieve effective runtime security, your containerized workloads in Kubernetes require ...
Security Boulevard
ITDR, organizations, cybersecurity posture, infrastructure, threat-hunting program. threat hunting, teams, intelligence, Edge Devices data threats IT cybersecurity defense attack alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

Anomaly Detection Using Alert Groups and Bayesian Networks

Metrics or alerts or dashboards? In the Kubernetes observability market, many solution companies are competing fiercely with commercial products and open source-based solutions for dominance. In addition, companies that want to introduce ...
Security Boulevard
CAST AI, KSPM, Google Kubernetes vulnerabilities

5 Ways K8s Apps Are Vulnerable to Supply Chain Attacks

What’s the correlation between Kubernetes and software supply chains? To answer that question, let’s start by exploring the latter. Simply put, software supply chains are the lifeblood of building, delivering, maintaining and ...
Security Boulevard
cloud, threats, vulnerabilities, Pulumi, security, cloud assets, GenAI, security, CASBs, brokers, cloud security, extortion, Palo Alto, AWS

3 Keys to an Effective Kubernetes Disaster Recovery Plan

The security of Kubernetes workloads is being put to the test. In Europe, IT teams have been dealing with simultaneous spikes in cyberattacks and extreme weather events, making it extremely difficult for ...
Security Boulevard
certificate water vulnerabilites Cybersecurity Doubters C-Suite

How to Eliminate Certificate Misconfiguration in Kubernetes

Kubernetes and OpenShift have become the standard for modern cloud-based application development. As infrastructure grows and clusters scale, huge volumes of TLS and mTLS certificates are used as development teams build and ...
Security Boulevard
zero-trust, security, Permiso, applications, zero-trust, ML, AI, zero-trust, access, zero-trust, PAM, zero-trust, ZTNA, migrating, backup data, zero-trust, security, zero-trust, business, policy container zero-trust ZTNA

Protecting Container Workloads With a Zero-Trust Strategy

Zero-trust security models are rising in popularity as arguably the most practical and logical approach for securing container environments. Whereas traditional reactive security models focus on maintaining firewalls and enforcing a ‘deny ...
Security Boulevard