PureSec Enables Easier Migration To Serverless With Unified Function, Container, and Host Security

| | Container Security
PureSec makes it easier for enterprises to adopt serverless by extending its leading Serverless Security Platform to containers and hosts, providing unified application layer protection for cloud-native applications. All of us here ...
Go Behind the Scenes of a Docker Cryptojacking Attack

Go Behind the Scenes of a Docker Cryptojacking Attack

When Threat Stack security analyst Ethan Hansen saw an alert in a customer’s environment that read /temp [RANDOM] cnrig, he knew his afternoon was about to get interesting. As part of his ...
Container Security with WhiteSource Software's David Habusha

DevOps Chat: Container Security with WhiteSource Software’s David Habusha

WhiteSource has become a force in the security of open source components in your applications. One would think that it would follow that securing these open source components inside of a container ...
Security Boulevard
Container Security Tips and Best Practices

Container Security Tips and Best Practices

Containers provide very important functionality: They package various software applications in “containers” to ensure that they are able to run correctly when moved from one computing environment to another. The container model ...
New Synopsys Polaris platform optimized for Red Hat OpenShift Container Platform

New Synopsys Polaris platform optimized for Red Hat OpenShift Container Platform

Open source is eating software, but Red Hat and Synopsys help you build and deploy containers more securely and at scale. Netscape founder Marc Andreessen once proclaimed that software is eating the ...
How to Identify Threats Within Your Docker Containers

How to Identify Threats Within Your Docker Containers

Now is a good time to review Threat Stack’s Docker integration in the wake of the recent runc CVE. The headline reporting gets a little hyperbolic, but I still think we should ...
Container Security: Securing From Within

Container Security: Securing From Within

| | Container Security
As containers continue to grow in popularity, issues surrounding their security have grown in parallel. Organizations, unfortunately, are disinclined or ill-equipped to include security in their container strategy. This webinar outlines the ...
How to Defend Against The runC Container Vulnerability

How to Defend Against The runC Container Vulnerability

Earlier this week security researchers Adam Iwaniuk and Borys Poplawski published details on a vulnerability in runC, the underlying container runtime for Docker, Kubernetes, cri-o, containerd, and other container-dependent programs. The vulnerability, ...
Upcoming Webinar — Container Incidents by Tabletop: Intro to Real-Time Security Operations

Upcoming Webinar — Container Incidents by Tabletop: Intro to Real-Time Security Operations

Sponsored by Threat Stack & PagerDuty Wednesday, February 13, 2019 1:00 P.M. ET Register Today When suspicious or risky behaviors occur on one of your servers or containers, what can you see ...
Announcing Black Duck OpsSight 2.2—Container security at scale 

Announcing Black Duck OpsSight 2.2—Container security at scale 

With containers, we’ve changed the way we deploy applications. Now it’s time to change the way we secure them, with container scanning tools for open source. Containers require a different approach to ...
Loading...