K8s Security

Comparing the Leading Tools That Scan Against the CIS Kubernetes Benchmark Framework
CIS Benchmarks are a focused set of guidelines for the secure configuration, vulnerability detection, and threat remediation of distributed workloads. In this article, we compare the leading tools that scan against the ...
Runtime context: the missing piece in Kubernetes security
Originally appeared on The New Stack. More and more organizations rely on Kubernetes to deploy and manage their applications. However, The post Runtime context: the missing piece in Kubernetes security appeared first on ARMO ...

Policy as code in Kubernetes: security with seccomp and network policies
The dynamic world of Kubernetes and cloud security is constantly evolving. As we explore this complicated ecosystem, it’s The post Policy as code in Kubernetes: security with seccomp and network policies appeared ...
Complete your Kubernetes security with runtime protection
Kubernetes today is the de facto standard for container orchestration, deployment automation, scaling, and management of containerized apps. The post Complete your Kubernetes security with runtime protection appeared first on ARMO ...

Cryptominers in the Cloud
Over the past decade, Bitcoin’s value has increased more than 200-fold. Similarly, other cryptocurrencies have also seen significant The post Cryptominers in the Cloud appeared first on ARMO ...
![[NEW] auto-generation of seccomp profiles 🤖](https://securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
NEW: ARMO Platform Introduces Auto-Generation of Seccomp Profiles
We are thrilled to announce the latest enhancement to ARMO Platform: Seccomp Profiles Leveraging eBPF. This feature uses The post NEW: ARMO Platform Introduces Auto-Generation of Seccomp Profiles appeared first on ARMO ...

Runtime anomaly detection in Kubernetes: enhancing security through context-aware profiling
Runtime anomaly detection is fast becoming a critical component for protecting containerized environments. Recent advancements in this field The post Runtime anomaly detection in Kubernetes: enhancing security through context-aware profiling appeared first ...

Unraveling the State of Kubernetes Security in 2024
We explored the Red Hat State of Kubernetes security report 2024, one of our favorite yearly reports. It’s The post Unraveling the State of Kubernetes Security in 2024 appeared first on ARMO ...

Why Kubernetes doesn’t manage users?
Kubernetes stands at the forefront of the container orchestration revolution by becoming most people’s go-to container orchestration platform. The post Why Kubernetes doesn’t manage users? appeared first on ARMO ...
eBPF use cases
What is eBPF and how can it be used within the Kubernetes environment? In the dynamic world of The post eBPF use cases appeared first on ARMO ...