alcide

Alcide Blog

Cloud-native Security Provider

The Emerging Market of CSPM and CWPP

Jan 4, 2021 9:19:02 AM / by Alon Berger posted in hybrid cloud, devsecops, cloud security, kubernetes, devops, Runtime, cloud, cwpp, cspm

0 Comments


Cloud security management challenges customers. That is according to Gartner, claiming that most cloud security failures are the end-users’ fault, not the providers. Considering the volatile landscape of cloud-native applications, even the smallest mistakes can lead to serious cybersecurity breaches and data leaks.

Since more workloads move to the cloud, securing those cloud environments will get more complex. With that in mind, Gartner came up with several essential tools for the evolving market of cloud security and assessment solutions. In this article, we will focus on the two more dominant ones:

Read More

Capturing 2020 - an Eventful Year With Alcide

Dec 21, 2020 12:27:59 PM / by Amir Ofek posted in devsecops, cloud security, kubernetes, devops, network security, Kubernetes security, secops

0 Comments


A year ago, when we planned our strategy and had our predictions for 2020, we most definitely could not predict how erratic 2020 would turn out to be. We too had to adjust and provide support for our employees’ and clients’ new needs. However, 2020 turned out to be a tipping point year for the Kubernetes community with a massive K8s adoption across the globe. Many companies made a huge shift to the cloud and in order to do it the most cost effective and efficient way they turned to Kubernetes. As a result we faced a growing need for Kubernetes Security and therefore 2020 has become the best year yet for Alcide.

Read More

Alcide and Amazon EKS Distro

Dec 1, 2020 4:17:21 PM / by Alon Berger posted in AWS, hybrid cloud, cloud security, kubernetes, devops, Kubernetes security, cloud

0 Comments


Kubernetes, as an open-source system for managing and orchestrating containerized applications, is widely used among numerous organizations and enterprises, looking for a better mechanism for deployment and scaling of applications. AWS has repeatedly kept innovating while providing its devoted customers with numerous supported services in any environment, whether it is on the cloud or on-premise.

Read More

Kubernetes Security Is Not Container Security

Nov 9, 2020 8:50:07 AM / by Natan Yellin posted in kubernetes, network security, Kubernetes security, container networking

0 Comments

 

Read More

Alcide's Latest and Greatest

Nov 5, 2020 9:39:46 AM / by Alon Berger posted in cloud security, kubernetes, devops, Kubernetes security, cloud

0 Comments

 

Read More

Top Four Ways to Visualize Traffic Between Microservices in Kubernetes

Nov 2, 2020 10:11:04 AM / by Natan Yellin posted in kubernetes, Kubernetes security, Runtime

1 Comment


You’re managing a complicated app on Kubernetes and want to see which microservices communicate with one another. Here are four different approaches you can take:

Read More

Kubernetes Threat Vectors: Part 1 - Initial Access

Oct 21, 2020 8:06:13 AM / by Alon Berger posted in cloud security, kubernetes, Kubernetes security, cloud

0 Comments

Kubernetes keeps transforming the way we think about modern application architecture, as it keeps its status as the flagship orchestrator for containerized workloads and services.

Read More

Cloud Native Security for Kubernetes In Practice

Oct 15, 2020 9:54:28 AM / by Alon Berger posted in cloud security, kubernetes, Kubernetes security

0 Comments

The month of October is well recognized as the National Cyber Security Awareness Month.
Here at Alcide, we leverage the hype around Cyber Security and share our take on how to protect your Cyberspace, specifically with Kubernetes.

Read More

Securing Kubernetes Deployments From Runway To Take-off

Sep 24, 2020 8:38:51 AM / by Rachel Cheyfitz posted in kubernetes, Kubernetes security, Advisor, Runtime, sKan, kaudit

0 Comments

Kubernetes use is rising rapidly: 58% more respondents than last year - 78% of this years’ respondents - reported in the 2019 CNCF (Cloud Native Computing Foundation) survey that they use Kubernetes today. With numbers like those, it looks like everyone is headed towards the cloud.

Read More

Insecure by Default - Kubernetes Networking

Sep 17, 2020 12:52:33 PM / by Natan Yellin posted in kubernetes, network security, Kubernetes security

0 Comments

Traditional network security includes protection against layer2 and layer3 spoofing attacks. Many security teams don’t realize it, but these threats are still relevant when running applications on a Kubernetes cluster in the cloud. You might be using a complex container network, but that doesn’t mean that simple spoofing attacks between pods aren’t possible. This matters because it dramatically increases the blast radius of compromised pods.

Read More

Subscribe to Email Updates