Cloud Security - Page 2.35

Discover Cloud Security News

4 Ways to Use Kernel Security Features for Process Monitoring

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The large attack surface of Kubernetes’ default pod provisioning is susceptible to critical security vulnerabilities, some of which include malicious exploits and container breakouts. I believe one of the most effective workload runtime security measures to prevent such exploits is layer-by-layer process monitoring within the container.

What Sysadmins Want to Know about OpenShift and Kubernetes in 2022

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Enable Sysadmin community continues to answer key questions about OpenShift and Kubernetes.   Another year has gone by, and what a year it's been! We've had tons of news in the Kubernetes and OpenShift world, and an increasing number of companies are adopting this technology, which is dominating the container-orchestration market. Last year, I wrote an article about 2021's OpenShift and Kubernetes highlights, and guess what: This is the list for the year 2022! Once again, the Enable Sysadmin community did not fail to contribute their diverse and expert knowledge. Have fun with this selection of Enable Sysadmin's top articles of 2022 about Kubernetes and OpenShift Container Platform (OCP).

AWS Plugs Holes in ECR APIs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

AWS has patched a vulnerability in its Elastic Container Registry (ECR) that was uncovered by Lightspin researcher Gafnit Amiga during an examination of AWS’s ECR APIs.

Delving into Container Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Container security is a fairly new technology, especially when viewed in the context of the speed of light technology changes in the fourth industrial revolution (4IR). Container technology itself is a topic that many security practitioners continue to find confusing, but its use is spreading fast, writes Craig De Lucchi, account director of CA Southern Africa.

Red Hat Expands Expansion of its Open Solutions on AWS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Red Hat announced an expansion of its open solutions publicly available in AWS Marketplace, a digital catalogue with thousands of software listings from independent software vendors that are focused on making it easy to find, test, buy and deploy software that runs on Amazon Web Services (AWS).

3 Ways to Help Customers Defend against Linux-Based Cyberattacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux operating systems power more than 90% of the world’s public cloud workload, from government web servers to smart manufacturing technologies. But as organizations continue to shift operations to the cloud, cybercriminals are following suit and directing their attention to Linux-based cyberattacks.

Primer to Container Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Containers are considered to be a standard way of deploying these microservices to the cloud. Containers are better than virtual machines in almost all ways except security, which may be the main barrier to their widespread adoption.