alcide

Alcide Blog

Cloud-native Security Provider

Nitzan Niv


Recent Posts

Kubernetes Audit: Making Log Auditing a Viable Practice Again.

Oct 31, 2019 9:26:57 AM / by Nitzan Niv posted in kubernetes, logs, audit, foresnsics

0 Comments

In the security world, one of the most established methods to identify that a system was compromised, abused or mis-configured is to collect logs of all the activity performed by the system’s users and automated services, and to analyze these logs.

Read More

Breaching the Cyber Defenses of Cloud Deployments with DNS Tunneling

Jan 23, 2019 6:33:48 AM / by Nitzan Niv posted in cloud security, kubernetes, workload protection, microservices, devops, dns tunneling

0 Comments

 

Tunneling is the practice of embedding messages of one network protocol within messages of a different network protocol. In a security context, tunneling is a way for an attacker to bypass security boundaries like the perimeter firewall of a cloud deployment by encapsulating malicious traffic within permitted traffic. This blog explores the challenges of detecting DNS tunneling, and offers a solution to how you can detect a DNS tunneling attack on you cloud environments.

Read More