Containers

Report: Linux malware and cloud misconfigurations top cybersecurity threats

A new report published by Trend Micro revealed that Linux malware and cloud misconfigurations make up some of the top cybersecurity threats facing organizations over the first half of 2022.

Report: Linux malware and cloud misconfigurations top cybersecurity threats Read More »

CRI-O vulnerability could allow an attacker to take control of Kubernetes environment

A CRI-O vulnerability CVE-2022-0811 in Kubernetes could allow an attacker to take control of affected Kubernetes environment, as well as other software/environments that use CRI-O runtime containers.

CRI-O vulnerability could allow an attacker to take control of Kubernetes environment Read More »

What Are Application Containers And How Do I Secure Them?

You may have wondered what application containers are, let alone how to secure them. The National Institute of Standards and Technology (NIST) sets out to explain the benefits and security concerns with application container technologies in the latest Special Publication (SP 800-190) Application Container Security Guide.

What Are Application Containers And How Do I Secure Them? Read More »