image (1)

Container Scanning: A Path to Enhanced Vulnerability Management

Over the last few years, containers have emerged as a cornerstone technology, enabling scalability, efficiency, and consistent environments across development, testing, and production. However, the rise of containers has also introduced new ...

30 new Semgrep rules: Ansible, Java, Kotlin, shell scripts, and more

By Matt Schwager and Sam Alws We are publishing a set of 30 custom Semgrep rules for Ansible playbooks, Java/Kotlin code, shell scripts, and Docker Compose configuration files. These rules were created ...
Contrast Serverless scans AWS Lambdas as containers

Contrast Serverless scans lambdas as containers | AWS Lambda Security | Contrast Security

| | aws, containers, Lambda, serverless
Contrast Security’s Serverless helps you to find and fix security issues on AWS Lambda functions deployed as containers.  ...
zero-trust, be, ZTA, architecture, security, Permiso, applications, zero-trust, ML, AI, zero-trust, access, zero-trust, PAM, zero-trust, ZTNA, migrating, backup data, zero-trust, security, zero-trust, business, policy container zero-trust ZTNA

Protecting Container Workloads With a Zero-Trust Strategy

Zero-trust security models are rising in popularity as arguably the most practical and logical approach for securing container environments. Whereas traditional reactive security models focus on maintaining firewalls and enforcing a ‘deny ...
Security Boulevard
Containers vs. VMs

Containers vs. Virtual Machines (VM): All You Need to Know

For organizations looking to standardize software deployments across platforms, cut back on overhead costs and enhance scalability, (server) virtualization andRead More The post Containers vs. Virtual Machines (VM): All You Need to ...
Containers vs. VMs

Containers vs. Virtual Machines (VM): All You Need to Know

For organizations looking to standardize software deployments across platforms, cut back on overhead costs and enhance scalability, (server) virtualization andRead More The post Containers vs. Virtual Machines (VM): All You Need to ...

3 Best Practices for Building Secure Container Images

Organizations are increasingly turning to containers to fuel their digital transformations. According to BMC, a 2019 survey found that more than 87% of respondents were running containers—up from 55% just two years ...
vulnerabilities, root cause, Microsoft Storm-1152 fake accounts CaaS

A Security Vulnerability Management Guide

Living in a container-native world is not easy. Containers have a reputation for being a point of entry for security vulnerabilities for many organizations. In 2015, according to a research paper, over ...
Security Boulevard
Thundra Logo

CaaS Services Through AWS, Azure, and Google Cloud

On the 1st of December, 2020, as the world was preparing for the end of a turbulent year dominated by the COVID-19 pandemic among other things, AWS presented the cloud community with ...
Thundra Logo Z

Container Workloads on AWS, Azure, and Google Cloud Platforms

Docker, an open-source project to automate deployment of applications as portable self-sufficient containers, has propelled an entire set of container technologies and a totally new way to design systems. As microservices architectures ...