Security | Threat Detection | Cyberattacks | DevSecOps | Compliance



Case study: Calico on AWS enables turnkey networking and security for Rafay's enterprise-grade Kubernetes Operations Platform

Organizations are adopting Kubernetes on Amazon Web Services (AWS) to modernize their applications. But Kubernetes clusters and application lifecycles demand a considerable investment of cost and resources, especially for edge applications.

Sysdig Training series - Introduction to Sysdig Secure

Kicking off our training series, this video offers an overview of the Sysdig Secure product, highlighting its capabilities in meeting compliance standards, managing vulnerabilities, and detecting threats within cloud and Kubernetes environments. Learn how Sysdig Secure's real-time visibility and automation aid in enhancing security posture and efficient incident handling in your infrastructure.

How Namespace-as-a-Service Enables Self-Service Kubernetes Recovery

Kubernetes has become the de facto standard for container orchestration and management, providing a powerful platform for deploying and managing containerized applications. One of the key benefits of Kubernetes is its support for namespaces, which allow users to isolate groups of resources within a cluster, providing a level of isolation and resource allocation for different applications or teams.


Track Risk Trends in your Container Images with Sysdig Risk-based Vulnerability Management

The number of detected common vulnerabilities and exposures (CVEs) has significantly increased in the past decade. In the last five years, security researchers reported over 100,000 new CVEs. The highest reported annual figure was in 2022, with over 25,000 new CVEs. This number can overwhelm any security team if it’s not managed correctly between assessment, reporting, remediation, and monitoring.


Unraveling the State of Kubernetes Security in 2023

ARMO addresses 76% of key concerns highlighted in the Red Hat 2023 Report. We analyzed one of our favorite annual reports – the Red Hat State of Kubernetes security report 2023. It’s chock full of really interesting data on one of our favorite topics: Kubernetes security! (Who knew?!) In this post we’re going to unpack some of the most compelling data points, and compare them to previous years.


Optimized Kubernetes cluster architecture: considerations and best practices

Kubernetes is a powerful platform for managing containerized applications at scale, but configuring a Kubernetes cluster can be complex and challenging. In this post, we’ll explore various key considerations for optimizing a Kubernetes cluster, including different cluster, node, and tenancy configurations. Kubernetes is a powerful platform for managing containerized applications at scale, but configuring a Kubernetes cluster can be complex and challenging.


Day 2 Falco Container Security - Tuning the Rules

In the world of cybersecurity, noise is a critical issue associated with Day 2 operations. The complex nature of noise and its impact on detection accuracy and false positives make it a challenging topic to address when creating detection rules, including in tools like Falco. This article will provide some guidelines on tuning Falco container security rules to eliminate noise.


Make your FortiGate firewalls work with Kubernetes: How Calico enables Fortinet firewalls to secure Kubernetes workloads

FortiGate firewalls are highly popular and extensively utilized for perimeter-based security in a wide range of applications, including monolithic applications developed and deployed using the traditional waterfall model. These firewalls establish a secure perimeter around applications, effectively managing inbound and outbound traffic for the organization. FortiGate relies on IP addresses for implementing “allow/deny” policies.