Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Kubescape Joins CNCF Incubation: A Major Milestone in Kubernetes Security

We’re excited to announce that Kubescape has officially entered the CNCF Incubating stage! This achievement marks a huge step for the project. The 2021 idea, devised by Ben Hirschberg, ARMO CTO and Co-founder, to create a simple tool for scanning Kubernetes clusters against NSA-CISA hardening guidelines, has since developed, expanded, improved and matured. Kubescape is now a robust, full-fledged security platform, all thanks to the amazing support from the Kubescape community and CNCF.

Stay Ahead of Kubernetes Security: ARMO Platform Now Supports CIS Kubernetes Benchmark v1.10

Kubernetes security is an evolving challenge, and staying compliant with industry best practices is crucial. That’s why we’re excited to announce that ARMO now supports the latest CIS Kubernetes Benchmark v1.10! Get your Kubernetes Security Checklist now.

Introducing Cloud Compliance in ARMO Platform!

We are thrilled to announce that Cloud Compliance is now available in ARMO platform, providing security and compliance teams with a powerful way to assess and maintain compliance across their AWS environments. With this new capability, ARMO automatically scans your cloud assets against industry-leading frameworks, ensuring that your cloud security posture aligns with best practices and regulatory requirements.

Runtime Security Tools: A Comprehensive Guide for 2025

While Cloud Security Posture Management (CSPM) and hardening are crucial security processes for maintaining a strong security posture, applications are most vulnerable during runtime, where unexpected threats can emerge. CSPM tools continuously scan cloud environments to detect misconfigurations, enforce compliance, and prioritize risks based on potential impact. However, runtime security becomes essential for addressing dynamic threats.

Runtime security in cloud environments: what you need to know

Unlike static environments, cloud workloads are constantly shifting, with containers and virtual machines spinning up and down, and crucial sensitive information flowing dynamically across multiple platforms. Recent incidents, such as the increase in container-based malware infections and cloud misconfigurations resulting in major data breaches, have highlighted the need for runtime security.

Advanced container registry scanning is now available in ARMO!

Exciting news for ARMO Platform users! We’re thrilled to announce the new version of container registry scanning to our suite of security features. This powerful enhanced capability improves your container security posture by allowing you to detect vulnerabilities earlier in the development process.

Why securing cloud-native applications goes beyond AppSec?

In today’s landscape of microservices, Kubernetes, and cloud environments, attacks can come from multiple vectors, with varying degrees of complexity. Understanding these vectors and how to detect them is crucial for securing your infrastructure and applications. This post will explore various attack scenarios including SQL Injection and Cluster Takeover, structured around the 4 Cs of cloud security: Cloud, Cluster (Kubernetes), Container (workload), and Code (application).