A Holistic Approach to Kubernetes Security and Compliance
Taking a holistic approach to security and risk is essential for any organization that uses Kubernetes or other cloud based container platform. As an open source container orchestration system for automating deployment, scaling, and management of containerized applications, Kubernetes is … Read more The post A Holistic Approach to Kubernetes ... Read More
Breacher Feature: Marriott’s Second Breach in Three Years
In November 2018, we wrote an article on Marriott’s first data breach when the hotel giant found out that there had been unauthorized access to the Starwood guest reservation database 2014. That unauthorized party had copied and encrypted information and … Read more The post Breacher Feature: Marriott’s Second Breach ... Read More

