alcide

Alcide Blog

Cloud-native Security Provider

Breaching the Cyber Defenses of Cloud Deployments with DNS Tunneling

Jan 23, 2019 6:33:48 AM / by Nitzan Niv posted in cloud security, kubernetes, workload protection, microservices, devops, dns tunneling

0 Comments

 

Tunneling is the practice of embedding messages of one network protocol within messages of a different network protocol. In a security context, tunneling is a way for an attacker to bypass security boundaries like the perimeter firewall of a cloud deployment by encapsulating malicious traffic within permitted traffic. This blog explores the challenges of detecting DNS tunneling, and offers a solution to how you can detect a DNS tunneling attack on you cloud environments.

Read More

How to Improve Your Kubernetes Security?

Dec 19, 2018 9:00:00 AM / by Elad Ishay posted in cloud security, kubernetes, workload protection, containers, microservices, devops

0 Comments

 

Last week our team came back from KubeCon Seattle, CNCF largest event to date with over 8000 attendees (!) where they showcased our Microservices Firewall, and I thought that now would be a good time to touch base again and talk about Kubernetes security.

Read More

The Evolution of Serverless, Part 2: From Containers to Functions

Dec 5, 2018 10:32:47 AM / by Anatoly Aliev posted in serverless, cloud security, workload protection, microservices

0 Comments

 

Following part 1 of our blog series, here's part 2. 

Read More

Live from Re:Invent! Alcide Cloud Security Platform is Available on AWS Marketplace for Containers

Nov 27, 2018 3:09:19 PM / by Aviv Fattal posted in AWS, cloud security, workload protection, containers, marketplace

0 Comments

We are happy to announce that Alcide's Cloud-Native Security Platform it is now available on the new AWS Marketplace for Containers.

AWS has announced today, Tuesday November 27th, during AWS re:Invent week on AWS Marketplace for Containers which adds support for software products that use Docker containers.

Read More

The Evolution of Serverless, Part 1: From Microservices to Containers

Nov 7, 2018 8:03:37 AM / by Anatoly Aliev posted in serverless, cloud security, workload protection

0 Comments

 

The post is part one of a blog series on the evolution of serverless security. The process of building applications has changed over time. Today, applications are designed to make use of multiple public clouds in addition to on-premises IT resources. They are also designed to use microservices, containers, and serverless. Each of these steps has been part of the evolution of application design, moving us towards applications that are inextricably interwoven with the infrastructure and workload automation software that controls the applications themselves.

Read More

What Is ChatOps and How Does It Scale Up Cloud Security?

Oct 18, 2018 3:43:35 AM / by Elad Ishay posted in devsecops, cloud security, Slack, chatops

0 Comments

 

 

Here’s a recent scenario: an organization’s  security team receives an alert from the monitoring system on their Slack channel with the content below:


AWS Account : SomeCompany_Development

IAM User : joel.burns@company.com

AWS API : AllowSecurityGroupIngress

Source IP Address : xxx.xxx.xxx.xxx

Security Group ID : sg-4fxxx4dx

Security Group Region : us-east-2

IP Protocol : tcp

From : 22

To : 22

IPRange : 0.0.0.0/0

Read More

Micro-segmentation for Better Cloud Security

Oct 10, 2018 5:20:56 AM / by Tal Rom posted in cloud security, Micro segmentation, workload protection

0 Comments

Micro-segmentation is an emerging practice that is quickly becoming a critical facet of cloud security. Its objective is not only to prevent compromise, but also to deal with what happens after compromise occurs. The purpose of micro-segmentation is to isolate applications and services from one another in order to prevent attackers from achieving their goalseven if they succeed in initially breaching the organization’s IT defenses.

Read More

Embedding Developers Know-how as Security Policy

Sep 5, 2018 7:43:11 AM / by Tal Rom posted in devsecops, cloud security, kubernetes

2 Comments

Deploying workloads in cloud environments comes with many benefits for businesses in terms of time to market, scalability, cost reduction and ease of use.

Read More

Knative Trifecta: Kubernetes, Serverless and Istio Service-mesh

Aug 8, 2018 1:03:00 PM / by Karine Regev posted in serverless, devsecops, cloud security, kubernetes

0 Comments

Trifecta: a variation of the perfecta in which a bettor wins by selecting the first three finishers of a race in the correct order of finish source

Read More

Cloud Security - Learning the Basics

Aug 7, 2018 7:51:33 AM / by Tal Rom posted in cloud security

0 Comments


This is the third post in a series focused on cloud security fundamentals.

Read More