Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unraveling the State of Kubernetes Security in 2023

ARMO addresses 76% of key concerns highlighted in the Red Hat 2023 Report. We analyzed one of our favorite annual reports – the Red Hat State of Kubernetes security report 2023. It’s chock full of really interesting data on one of our favorite topics: Kubernetes security! (Who knew?!) In this post we’re going to unpack some of the most compelling data points, and compare them to previous years.

Optimized Kubernetes cluster architecture: considerations and best practices

Kubernetes is a powerful platform for managing containerized applications at scale, but configuring a Kubernetes cluster can be complex and challenging. In this post, we’ll explore various key considerations for optimizing a Kubernetes cluster, including different cluster, node, and tenancy configurations. Kubernetes is a powerful platform for managing containerized applications at scale, but configuring a Kubernetes cluster can be complex and challenging.

Platform Engineering and Security: A Very Short Introduction

Is DevOps really dead? Learn about the rise of platform engineering and how it differs from DevOps in terms of self-service capabilities and automation. Discover how security fits into this new paradigm and the benefits of platform engineering for software development teams of various sizes.

All you need to know about CIS Benchmarks

In the ever-evolving landscape of cybersecurity, organizations strive to safeguard their systems and data against emerging threats. Amidst this pursuit, CIS Benchmarks emerge as an indispensable resource, offering a wealth of knowledge and practical recommendations. But what exactly are CIS Benchmarks, and why are they highly regarded across industries?

Teleport Team

Teleport Team is the latest SaaS offering from Teleport. Teleport Team is designed to secure your infrastructure with safe, short-lived, and secretless access. It's an ideal solution for startups, rapidly expanding businesses, or even hobbyists who want to fortify their infrastructure without the hassle of deploying, updating, or maintaining a Teleport Cluster. Starting at just $15 per monthly active user with 50 included protected resources.

Starting With Snyk: an overview of the CLI onboarding flow

When starting with Snyk, users can import projects via Git repository or utilize CLI to run test their application code locally or via CI/CD. In this video, we will discuss the onboarding flows meant to help new users utilize the CLI to run their first source code (SAST), open source (SCA), container and infrastructure as code (IaC) tests and start fixing issues. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.