How Dockershim’s Forthcoming Deprecation Affects Your Kubernetes

How Dockershim’s Forthcoming Deprecation Affects Your Kubernetes

Container orchestration platform Kubernetes announced in December 2020 that its third and final release, Kubernetes v1.20, would deprecate dockershim and subsequently Docker as a container runtime. This deprecation has brought multiple changes that admins must be aware of and accordingly respond to.  To best understand these changes and how dockershim’s deprecation affects admins and their work, let’s quickly dive into what dockershim is, its relevance to container security, and the reasons behind Kubernetes’ decision to…

Read More

Defending against insider threats in a remote world

Defending against insider threats in a remote world

Defending against insider threats in a remote world | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Improve supply chain security with intelligence from surface, deep & dark web

Improve supply chain security with intelligence from surface, deep & dark web

Improve supply chain security with intelligence from surface, deep & dark web | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

When privacy and security converge: A CSO’s perspective on how security organizations can thrive

When privacy and security converge: A CSO’s perspective on how security organizations can thrive

When privacy and security converge: A CSO’s perspective on how security organizations can thrive | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Cloud computing is a bonanza – but security lags

Cloud computing is a bonanza – but security lags

Cloud computing is a bonanza – but security lags | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Interview strategies for security professionals: The virtual edition

Interview strategies for security professionals: The virtual edition

Interview strategies for security professionals: The virtual edition | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Writing the future history of security research

Writing the future history of security research

Writing the future history of security research | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

CISA, FBI launch Operation Flashpoint to raise awareness about how to prevent bomb making

CISA, FBI launch Operation Flashpoint to raise awareness about how to prevent bomb making

CISA, FBI launch Operation Flashpoint to raise awareness about how to prevent bomb making | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Despite ransomware distractions, the insider risk continues

Despite ransomware distractions, the insider risk continues

Despite ransomware distractions, the insider risk continues | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Four in Ten Americans Use Embarrassing Passwords

Four in Ten Americans Use Embarrassing Passwords

A large proportion of Americans are protecting their digital accounts with passwords that they would be embarrassed to say out loud. According to new research by identity management company Beyond Identity, nearly four in ten (38%) users in the United States defend their data with a password that could raise a blush.  While 16% of those users had reached for a profanity when coming up with an access phrase, more than a quarter (26%) referenced a niche interest…

Read More
1 2,352 2,353 2,354 2,355 2,356 2,735