Cloud security management challenges customers. That is according to Gartner, claiming that most cloud security failures are the end-users’ fault, not the providers. Considering the volatile landscape of cloud-native applications, even the smallest mistakes can lead to serious cybersecurity breaches and data leaks.
Since more workloads move to the cloud, securing those cloud environments will get more complex. With that in mind, Gartner came up with several essential tools for the evolving market of cloud security and assessment solutions. In this article, we will focus on the two more dominant ones:
The Emerging Market of CSPM and CWPP
Jan 4, 2021 9:19:02 AM / by Alon Berger posted in hybrid cloud, devsecops, cloud security, kubernetes, devops, Runtime, cloud, cwpp, cspm
Capturing 2020 - an Eventful Year With Alcide
Dec 21, 2020 12:27:59 PM / by Amir Ofek posted in devsecops, cloud security, kubernetes, devops, network security, Kubernetes security, secops
A year ago, when we planned our strategy and had our predictions for 2020, we most definitely could not predict how erratic 2020 would turn out to be. We too had to adjust and provide support for our employees’ and clients’ new needs. However, 2020 turned out to be a tipping point year for the Kubernetes community with a massive K8s adoption across the globe. Many companies made a huge shift to the cloud and in order to do it the most cost effective and efficient way they turned to Kubernetes. As a result we faced a growing need for Kubernetes Security and therefore 2020 has become the best year yet for Alcide.
Alcide and Amazon EKS Distro
Dec 1, 2020 4:17:21 PM / by Alon Berger posted in AWS, hybrid cloud, cloud security, kubernetes, devops, Kubernetes security, cloud
Kubernetes, as an open-source system for managing and orchestrating containerized applications, is widely used among numerous organizations and enterprises, looking for a better mechanism for deployment and scaling of applications. AWS has repeatedly kept innovating while providing its devoted customers with numerous supported services in any environment, whether it is on the cloud or on-premise.
Kubernetes Security Is Not Container Security
Nov 9, 2020 8:50:07 AM / by Natan Yellin posted in kubernetes, network security, Kubernetes security, container networking
Alcide's Latest and Greatest
Nov 5, 2020 9:39:46 AM / by Alon Berger posted in cloud security, kubernetes, devops, Kubernetes security, cloud
Top Four Ways to Visualize Traffic Between Microservices in Kubernetes
Nov 2, 2020 10:11:04 AM / by Natan Yellin posted in kubernetes, Kubernetes security, Runtime
You’re managing a complicated app on Kubernetes and want to see which microservices communicate with one another. Here are four different approaches you can take:
Kubernetes Threat Vectors: Part 1 - Initial Access
Oct 21, 2020 8:06:13 AM / by Alon Berger posted in cloud security, kubernetes, Kubernetes security, cloud
Kubernetes keeps transforming the way we think about modern application architecture, as it keeps its status as the flagship orchestrator for containerized workloads and services.
Cloud Native Security for Kubernetes In Practice
Oct 15, 2020 9:54:28 AM / by Alon Berger posted in cloud security, kubernetes, Kubernetes security
The month of October is well recognized as the National Cyber Security Awareness Month.
Here at Alcide, we leverage the hype around Cyber Security and share our take on how to protect your Cyberspace, specifically with Kubernetes.
Securing Kubernetes Deployments From Runway To Take-off
Sep 24, 2020 8:38:51 AM / by Rachel Cheyfitz posted in kubernetes, Kubernetes security, Advisor, Runtime, sKan, kaudit
Kubernetes use is rising rapidly: 58% more respondents than last year - 78% of this years’ respondents - reported in the 2019 CNCF (Cloud Native Computing Foundation) survey that they use Kubernetes today. With numbers like those, it looks like everyone is headed towards the cloud.
Insecure by Default - Kubernetes Networking
Sep 17, 2020 12:52:33 PM / by Natan Yellin posted in kubernetes, network security, Kubernetes security
Traditional network security includes protection against layer2 and layer3 spoofing attacks. Many security teams don’t realize it, but these threats are still relevant when running applications on a Kubernetes cluster in the cloud. You might be using a complex container network, but that doesn’t mean that simple spoofing attacks between pods aren’t possible. This matters because it dramatically increases the blast radius of compromised pods.