Announcing the NeuVector & Sonatype Nexus Lifecycle Integration: Securing Containers Across the SDLC

It’s no secret that container usage has increased rapidly in the last few years. As reported in our 2020 State of the Software Supply Chain Report, “Pulls of container images topped 8 ...

5 Risks You Need to Remember When Securing Your Containers

Containers are on the rise. As reported by GlobalNewswire, Allied Market Research estimated that the application market would grow from its 2016 value of $698 million to $8.20 by 2025. With a ...

DEF CON 27, Packet Hacking Village – Jay Beale’s ‘Attacking And Defending Kubernetes’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink ...

Cloud Native Application Security: Protection At and Within the Perimeter

What makes an application “cloud native” and what’s so different about protecting these kinds of apps? Ultimately, the answer lies in how cloud native applications are not as tightly bound to the ...
Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

The Black Duck Connector for OpenShift, which identifies and tags open source components, can now scan Red Hat Quay container registry images via a webhook. The post Extending Black Duck’s capability with ...

DEF CON 27, Appsec Village, YanYan Wang’s ‘Automate Pen Testing In Dockerized CI CD Environment’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink ...

Application Layer Protection for Istio Service Mesh

Today, Signal Sciences announced another industry-first: the launch of our next-gen WAF integration with Istio service mesh. As development teams move from monolithic to distributed, microservices-based application architectures, managing the security and ...
[Webinars] Container security, tool misuse and abuse, open source in M&A

[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source. The post [Webinars] Container security, tool misuse and abuse, open ...

Signal Sciences Launches Pivotal Container Service (PKS) Integration

Container adoption has grown rapidly in recent years: Gartner Research predicts that by 2022 more than 75% of organizations globally will be running containerized applications in production1. From our inception, Signal Sciences ...
6 Essential Steps to Avoid Container Security Vulnerabilities

6 Essential Steps to Avoid Container Security Vulnerabilities

| | Container Security, Lacework
Containers and containerized applications deliver new levels of speed and efficiency to modern development teams. However, containers create new security challenges. While these architectures enable dynamic and automated application deployments, the very ...