KubeCon

KubeCon 2023: Securing Software Delivery and Deployment
At KubeCon 2023, Mitch Ashley talks with Gopal Dommety and David Green from OpsMX about securing software delivery and deployment ...

KubeCon 2023: Not Your Father’s Tenable
This is not your father's Tenable! Alan Shimel talks with John Tonello from Tenable about the company's past, present and future ...

KubeCon 2023: Bridging the AppSec Tools Gap
Alan Shimel: Hey everyone, it’s Alan Shimel, Tech Strong TV, and we’re back here live at KubeCon in the windy city of Chicago. It wasn’t that windy out. It was actually pretty ...

Zero-Trust, the Service Mesh and Linkerd
By now, everyone working in the cloud-native world has probably heard something about “zero-trust”. It’s a ubiquitous buzzword: Even the White House is getting in on the action, and the buzz has ...

Process Monitoring: Detect Malicious Behavior in Your Containers
The default pod provisioning mechanism in Kubernetes has a substantial attack surface, making it susceptible to malevolent exploits and container breakouts. To achieve effective runtime security, your containerized workloads in Kubernetes require ...

Anomaly Detection Using Alert Groups and Bayesian Networks
Metrics or alerts or dashboards? In the Kubernetes observability market, many solution companies are competing fiercely with commercial products and open source-based solutions for dominance. In addition, companies that want to introduce ...

5 Ways K8s Apps Are Vulnerable to Supply Chain Attacks
What’s the correlation between Kubernetes and software supply chains? To answer that question, let’s start by exploring the latter. Simply put, software supply chains are the lifeblood of building, delivering, maintaining and ...

3 Keys to an Effective Kubernetes Disaster Recovery Plan
The security of Kubernetes workloads is being put to the test. In Europe, IT teams have been dealing with simultaneous spikes in cyberattacks and extreme weather events, making it extremely difficult for ...

How to Eliminate Certificate Misconfiguration in Kubernetes
Kubernetes and OpenShift have become the standard for modern cloud-based application development. As infrastructure grows and clusters scale, huge volumes of TLS and mTLS certificates are used as development teams build and ...

Protecting Container Workloads With a Zero-Trust Strategy
Zero-trust security models are rising in popularity as arguably the most practical and logical approach for securing container environments. Whereas traditional reactive security models focus on maintaining firewalls and enforcing a ‘deny ...