Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ARMO

ARMO selected by Orange Business to Secure its Managed Kubernetes Services

We’re honored to share a new partnership with Orange Business (Norway), a global leader in digital services. ARMO was selected to secure Orange Business’ new Managed Kubernetes Service (MKS) with ARMO’s advanced runtime-driven cloud security platform. This collaboration marks a significant milestone in delivering robust security solutions for on-premises Kubernetes environments for Orange Business.

Runtime security in multi-cloud environments: best practices and importance

Runtime security in multi-cloud environments encompasses the continuous monitoring and protection of cloud-based resources during their active operation. Unlike traditional security approaches that focus on static configurations or pre-deployment checks, runtime security emphasizes: This approach ensures that potential risks are identified and mitigated in real-time, providing an additional layer of protection against both known and emerging threats in complex multi-cloud setups.

Policy as code in Kubernetes: security with seccomp and network policies

The dynamic world of Kubernetes and cloud security is constantly evolving. As we explore this complicated ecosystem, it’s crucial to understand the role of policy as code (PaC) and its impact on operations and security teams. Emerging from the broader paradigm of infrastructure as code (IaC), PaC represents a significant shift in how we manage and secure cloud-native environments.

The vulnerability puzzle: understanding base images and their relationship to CVEs

Have you ever heard of CVEs? Maybe not by their acronym, but Common Vulnerabilities and Exposures, monitored by the CVE Program Mission, are everywhere. As of the writing of this article, there are over 220,000 CVE Records available—meaning many potential threats you could be exposed to. How can you ever protect your infrastructure against this reality? Well, the good news is, you usually don’t have to.

The importance of CSPM inventory

Almost all organizations either rely on cloud computing or are planning to adopt cloud computing technologies soon to ensure their businesses remain competitive and gain an edge over the competition. As businesses increasingly rely on cloud services to manage their operations, the complexity of these environments continues to grow, introducing new challenges in maintaining security and compliance. This is where Cloud Security Posture Management (CSPM) comes into the picture.

CUPS: Unraveling a Critical Vulnerability Chain in Unix Printing Systems

A series of critical vulnerabilities has been uncovered in the Common Unix Printing System (CUPS), specifically in the cups-browsed component and related libraries. This vulnerability chain allows remote, unauthenticated attackers to potentially execute arbitrary code with root privileges on affected systems. The discovery highlights significant security risks in a widely-used open-source component and raises crucial questions about legacy system support and security in modern IT environments.

Complete your Kubernetes security with runtime protection

Kubernetes today is the de facto standard for container orchestration, deployment automation, scaling, and management of containerized apps. The robustness and scalability of this open-source platform make it a valuable tool for businesses leveraging cloud-native technologies and DevOps practices. However, as with any technology that handles sensitive data and crucial operations, the importance of security in Kubernetes environments can’t be overstated.

Top open-source CSPM projects to secure your cloud infrastructure

As more organizations move their critical infrastructure to the cloud, ensuring security has become a top priority. This is where Cloud Security Posture Management (CSPM) comes in. CSPM solutions validate the configuration of cloud services from a security perspective, ensuring alignment with best practices and compliance frameworks such as CIS Benchmarks, PCI-DSS, NIST, and others.

CEL and Kubescape: transforming Kubernetes admission control

Admission control is a crucial part of the Kubernetes security, enabling the approval or modification of API objects as they are submitted to the server. It allows administrators to enforce business logic or policies on what objects can be admitted into a cluster. Kubernetes RBAC is a scalable authorization mechanism, but lacks the fine grained control over different Kubernetes objects. This creates the need for another layer of control which is Admission Policies.

Cryptominers in the Cloud

Over the past decade, Bitcoin’s value has increased more than 200-fold. Similarly, other cryptocurrencies have also seen significant growth, prompting many individuals to engage in mining for profit. This rise in cryptocurrency mining has led to a substantial increase in the use of cryptominers. As organizations increasingly migrate their computing workloads to the cloud for various benefits, attackers have shifted their focus to these cloud resources for cryptocurrency mining.