Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Multi-Cluster Manager for Velero in under 5 mins

Welcome to our latest video where we'll be discussing CloudCasa for Velero - a game-changing solution for multi-cluster Kubernetes data protection. With over 50 million pulls from DockerHub, Velero is the go-to open-source backup option for Kubernetes. CloudCasa for Velero is the first Kubernetes backup service that's fully complementary and open-source compatible with Velero. In this video, Martin Phan, Field CTO for CloudCasa, explores the benefits of using CloudCasa for Velero and how it can enhance your multi-cluster Kubernetes data protection.

Malicious Packages Special Report Reveals 315% Spike in Attacks

Today’s attackers aren’t just exploiting vulnerabilities — research from Malicious Packages Special Report: Attacks Move Beyond Vulnerabilities illustrates the growing threat of malicious packages. According to the report, the number of malicious packages published to npm and rubygems alone grew 315 percent from 2021 to 2022.

Failing Less at Kubernetes with Policy as Code & OPA

Kubernetes has become the de facto way to run modern computing platforms, both in the cloud and on-premise. This is a huge change from just a few years ago, and it didn’t happen overnight. On the road to production readiness with Kubernetes, many have run afoul. Thanks to Kubernetes Failure Stories though, engineering teams from around the world have shared in detail what they did wrong and how they can avoid making the same mistake in the future.

Warning: Poor Application Security Health Could Kill You

The Food and Drug Administration (FDA) recently implemented new guidance regarding medical device cybersecurity. It’s not a moment too soon, as new cases arise in which healthcare technology is compromised by vulnerabilities that escalate risks, which could threaten patients’ lives. In a recent survey, over 20% of healthcare organizations said that after a cyberattack, their patient mortality rates had risen, and another 57% reported that cyberattacks led to poorer outcomes for patients.

Security Measures for a Dedicated Server for Video Streaming

When it comes to video streaming, security should be a top priority. A dedicated server provides the necessary resources and control to host a video streaming website, but it also comes with a greater responsibility for ensuring security. In this article, we will discuss the various security measures that you should take for a dedicated server for video streaming.

What Is Kubernetes Admission Control?

Kubernetes admission control is a mechanism that validates and modifies requests to the Kubernetes API server before they are processed. Admission control can enforce policies, security rules, resource limits, default values and other elements of the cluster’s use. This mechanism can also reject requests that violate certain rules or conditions.

Why the Need for Application Security Intensifies as EU Tightens Cybersecurity Requirements

Two new sets of regulations introduced by the European Union (EU) indicate that the public sector is taking increased interest in improving cybersecurity and resilience. The EU is introducing the Digital Operational Resilience Act (DORA) for financial institutions and the Cyber Resilience Act (CRA) for software and hardware providers, both designed to enforce software security and secure delivery of services.