
Kubernetes 1.31: a security perspective
Kubernetes v1.31 brings about some noteworthy improvements to the popular container orchestration platform that improve security and other The post Kubernetes 1.31: a security perspective appeared first on ARMO ... Read More

Seccomp for Kubernetes workloads
Seccomp in a nutshell Seccomp, short for Secure Computing Mode, is a security feature in the Linux kernel The post Seccomp for Kubernetes workloads appeared first on ARMO ... Read More
What is the difference between a root process and a containerized root process?
To answer this question, let’s first look at some history. Processes are software instances running in their own The post What is the difference between a root process and a containerized root process? appeared first on ARMO ... Read More

Yet another reason why the xz backdoor is a sneaky b@$tard
(We are talking about the xz/libzma backdoor identified with CVE-2024-3094) Background If you just woke up from hibernation The post Yet another reason why the xz backdoor is a sneaky b@$tard appeared first on ARMO ... Read More

Enhancing Kubernetes Security with Seccomp profiles
Seccomp: a powerful security tool Seccomp, short for Secure Computing Mode, is a built-in security feature in the The post Enhancing Kubernetes Security with Seccomp profiles appeared first on ARMO ... Read More

Kubernetes 1.30: A Security Perspective
Kubernetes 1.30 marks a significant milestone in the evolution of the widely used orchestration platform, particularly regarding security The post Kubernetes 1.30: A Security Perspective appeared first on ARMO ... Read More

Kubernetes security best practices: definitive guide for security professionals
Opening words As containerized applications become the norm, the complexities of securing these dynamic, scalable environments demand a The post Kubernetes security best practices: definitive guide for security professionals appeared first on ARMO ... Read More

Shield GKE’s Achilles Heel using RBAC
If you’re using GKE (Google Kubernetes Engine), you should be extremely cautious when adding roles to the system:authenticated The post Shield GKE’s Achilles Heel using RBAC appeared first on ARMO ... Read More

Are you looking for vulnerabilities in the right places?
With the rapid pace of technological evolution, ensuring security within the systems we operate and the software we The post Are you looking for vulnerabilities in the right places? appeared first on ARMO ... Read More

Why context matters in Kubernetes security
Background There are things in the world that are absolute, and there are things that are relative. For The post Why context matters in Kubernetes security appeared first on ARMO ... Read More