Tag - Kubernetes

Kubernetes Security: Managed or Self-Hosted?

Originally published by Tenable. Written by Mark Beblow. Many enterprises have adopted container technology because it helps them to streamline the building, testing and deploying of applications. The benefits of container technology include better resource efficiency, portability, consistency and scalability. However, as organizations ramp up the number of deployed...

Resource Constraints in Kubernetes and Security

A Practical Guide Originally published by Sysdig. Written by Nigel Douglas. The Sysdig 2024 Cloud‑Native Security and Usage Report highlights the evolving threat landscape, but more importantly, as the adoption of cloud-native technologies such as container and Kubernetes continue to increase, not all organizations are following best practices. This is ultimately...

Kubernetes Security with Least Privilege

Originally published by Tenable. Written by Tom Croll, Advisor at Lionfish Tech Advisors. Kubernetes has emerged as the de facto standard for managing containerized workloads across private and public clouds. However, the evolution of security standards has significantly lagged, leading to heightened risks of cyberattacks and data breaches for organizations using...