KubeCon

eBPF Versus Kernel Extensions
eBPF-based agents have numerous advantages that make them a safer, more efficient option in comparison to agents that use kernel extensions ...
Security Boulevard

Protecting the Soft Underbelly of Your Organization
Organizations are waking up to the sad truth that their workloads are often a weakly protected, and underappreciated aspect of their IT infrastructure, and this problem is growing worse by the day. ...
Security Boulevard

Managing and Mitigating Risk: A Cybersecurity Approach Using Identity-Based Access Controls and Secrets Management
Centering your strategy around identity to manage and mitigate risk will give you the best possible chance of success ...
Security Boulevard

KubeCon 2023: Securing Software Delivery and Deployment
At KubeCon 2023, Mitch Ashley talks with Gopal Dommety and David Green from OpsMX about securing software delivery and deployment ...
Security Boulevard

KubeCon 2023: Not Your Father’s Tenable
This is not your father's Tenable! Alan Shimel talks with John Tonello from Tenable about the company's past, present and future ...
Security Boulevard

KubeCon 2023: Bridging the AppSec Tools Gap
Alan Shimel | | Apiiro, Application Security, AppSec, Cloud Security, Cloud-Native Security, KubeCon
Alan Shimel: Hey everyone, it’s Alan Shimel, Tech Strong TV, and we’re back here live at KubeCon in the windy city of Chicago. It wasn’t that windy out. It was actually pretty ...
Security Boulevard

Zero-Trust, the Service Mesh and Linkerd
By now, everyone working in the cloud-native world has probably heard something about “zero-trust”. It’s a ubiquitous buzzword: Even the White House is getting in on the action, and the buzz has ...
Security Boulevard

Process Monitoring: Detect Malicious Behavior in Your Containers
The default pod provisioning mechanism in Kubernetes has a substantial attack surface, making it susceptible to malevolent exploits and container breakouts. To achieve effective runtime security, your containerized workloads in Kubernetes require ...
Security Boulevard

Anomaly Detection Using Alert Groups and Bayesian Networks
Metrics or alerts or dashboards? In the Kubernetes observability market, many solution companies are competing fiercely with commercial products and open source-based solutions for dominance. In addition, companies that want to introduce ...
Security Boulevard

5 Ways K8s Apps Are Vulnerable to Supply Chain Attacks
What’s the correlation between Kubernetes and software supply chains? To answer that question, let’s start by exploring the latter. Simply put, software supply chains are the lifeblood of building, delivering, maintaining and ...
Security Boulevard