Secure DevOps Pipelines and Cloud Native Apps - Tagged - Security Boulevard
Identity Management Day

It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic technological and economic ...
DevOps Cloud Native Application Security

Applications Are Everything and Everywhere – Does Whack-a-Mole Security Work?

The SolarWinds digital supply chain attack began by compromising the “heart” of the CI/CD pipeline and successfully changing application code. It highlighted the major challenges organizations face in securing their applications across ...
Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps

Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps

Editor’s Note: This is part three of a blog series on securing privileged access and identities in the cloud. Part 1: Five Best Practices for Securing Privileged Access and Identities for the Cloud ...
Attacking Kubernetes Clusters Through Your Network Plumbing: Part 1

Attacking Kubernetes Clusters Through Your Network Plumbing: Part 1

Have you ever wondered how the water supply gets into your home and to the taps? Honestly it may not be something you ever thought about. When receiving a system that works ...
Ramp Up Container Security With Red Hat OpenShift and CyberArk

Ramp Up Container Security With Red Hat OpenShift and CyberArk

Microservices and containerized approaches are becoming increasingly critical elements of digital transformation strategies. Container platforms offer developers and operations teams a simplified way to build and deploy better applications faster across hybrid ...
CRI: The Second Boom of Container Runtimes - Harry Zhang & Xu Wang, HyperHQ

Using Kubelet Client to Attack the Kubernetes Cluster

In this blog post, we are going to look at the Kubernetes agent, kubelet (see Figure 1), which is responsible for the creation of the containers inside the nodes and show how ...
Privileged Access Management

The Gartner 2020 Magic Quadrant for PAM is Here!

Today, we announced that CyberArk has been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management.1 CyberArk was positioned both highest in ability to execute and furthest in ...
Source Code Leak Lesson: Secure Development Environments

Source Code Leak Lesson: Secure Development Environments

Once again we are seeing how vulnerable and easily development environments can be exploited with the recent news of a massive trove of leaked code from 50+ enterprises across multiple industries, including ...
Secrets Management

How Security Islands Prevent Effective Secrets Management

The past few years have been an exciting time for the tech industry. The DevOps revolution has led to increased adoption of Kubernetes. Modern software development toolkits enable developers to easily and ...