2% of organizations feel confident with current security strategies

2% of organizations feel confident with current security strategies

2% of organizations feel confident with current security strategies | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Why is runtime security back in vogue?

Why is runtime security back in vogue?

Why is runtime security back in vogue? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Guide to Container Management on AWS

Guide to Container Management on AWS

Container management aims to help you create, govern, and maintain your containers. There are tools and services in the market that enable automation of the creation, deployment, maintenance, scaling, and monitoring of application or system containers. Container management in the context of AWS is about understanding the AWS services and options that abstract aspects of managing cloud or on-prem infrastructure, security, scalability, and high availability of your services. Collectively, these container management services enable you…

Read More

Are My Containers Affected by the New OpenSSL Vulnerabilities?

Are My Containers Affected by the New OpenSSL Vulnerabilities?

On October 25th it was announced to the world that the OpenSSL project team would release OpenSSL version 3.0.7 to fix a critical security issue that affected all OpenSSL 3 versions the day after Halloween, November 1st. Many of us security folk, while trick-or-treating with our kids, were confronted with the fear of not only spooky Halloween decorations and costumes but of understanding what this vulnerability mean to the security of our applications? Asking ourselves,…

Read More

Detect Threats with Runtime Security

Detect Threats with Runtime Security

Although containerization provides a reliable and lightweight runtime environment that is consistent from host to host, it only adds to the complexity that stems from multi-cloud infrastructure services and the need to maintain legacy servers and virtualized data centers. This opens up a new range of security risks coming from the nature of the environment. A common example of this environment is a container running on a host with a specific network setup, and in…

Read More

Amazon Elastic Kubernetes (EKS) vs Azure Kubernetes Service (AKS)

Amazon Elastic Kubernetes (EKS) vs Azure Kubernetes Service (AKS)

What is Kubernetes? Kubernetes is an open-source system that simplifies container orchestration through several built-in features. Without a tool like Kubernetes, it would be almost impossible to manually deploy and manage containers using command line on a large scale. How to manage Kubernetes Kubernetes requires high-level skills to deploy, configure, and manage a cluster. Many organizations lack the in-house resources needed to make the most of Kubernetes — and those that do have the resources…

Read More

Virtual Machine vs Container

Virtual Machine vs Container

The difference between virtual machines and containers Virtual machines (VMs) and containers are as similar as they are different. They each have their own unique characteristics and use cases that separate them from each other. However, they are similar in that they can be used either together, or interchangeably, to enhance IT and DevOps efficiency. Great, all that sounds fine and dandy, but what are virtual machines and containers actually used for? I’m glad you…

Read More

Secure application development for the cloud best practices

Secure application development for the cloud best practices

Why follow best practices? Understanding and following best practices as well as building in the cloud on Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform™, Kubernetes, containers, and applications will enable you to get the most out of your toolkit. This includes more security as you are building, more proficiency with the tools and services you are using, better structure, faster environment, a reliable system that will withstand outages, and a more cost-effective solution….

Read More

10 best practices for S3 bucket security configuration

10 best practices for S3 bucket security configuration

Rule GD-001: GuardDuty enabled Conformity has rule GD-001 for enabling GuardDuty. This rule checks that GuardDuty is enabled in all regions for the security of your AWS environment and infrastructure. Because this rule is a medium-level threat, Conformity encourages compliance. The result of non-compliance is the potential occurrence and proliferation of malicious activity on your AWS account and infrastructure without your knowledge, such as Recon:EC2/PortProbeUnprotectedPort, UnauthorizedAccess:EC2/SSHBruteForce, or UnauthorizedAccess:IAMUser/MaliciousIPCaller. To remediate, simply visit GuardDuty to enable…

Read More

Cloud Native Security Platform Must-have Components

Cloud Native Security Platform Must-have Components

5 key components to review To ensure secure apps are developed and deployed, McCluney and Griffin recommend implementing review processes for the following: Cloud posture and compliance Vulnerability visibility and management Container security Template scanning Securing your code Before delving into each of these components, let’s review why each one is key, and understand how the state of the industry has shaped these key security components. 4 cloud native development trends McCluney and Griffin point…

Read More
1 2