Avatar photo
By: Fei Huang

May 17, 2022 7:55 am

9,213 views

A Zero Trust, Open Source, Cloud Native Security Model

By now, you’ve probably heard about zero trust security. Zero trust is more than the latest tech marketing buzzword; it’s a practical approach to securing container environments. This model emerged as the application/service perimeter began to disappear as we evolved from physical devices to VMs, microservices and finally, distributed workloads in the cloud […]

Read More


Avatar photo
By: Fei Huang

February 3, 2021 11:33 am

1,521 views

Don’t let Kubernetes break your SOC2 compliance

OverviewIt was said “The world's most valuable resource is no longer oil, but data.”  Whether this is true or not, data breaches remain one of the top security challenges for modern enterprises . One recent example that shook security professionals is the SolarWinds attack that impacted […]

Read More


Avatar photo
By: Fei Huang

July 30, 2020 11:53 am

924 views

How to Protect Container Infrastructures Against the Malware “Doki”

By Fei Huang Recently, security researchers from Intezer shared an interesting case study about malware targeting public Docker environments. Security researchers have named this malware Doki. It is being downloaded and installed as a Linux backdoor. It is using the DynDNS service and a unique Domain Generation Algorithm (DGA) based on the Dogecoin cryptocurrency blockchain […]

Read More


Avatar photo
By: Fei Huang

June 4, 2020 12:11 pm

992 views

How to Protect Secrets in Containers Using DPI and DLP

Every cloud application and service utilizes a key (secret) to identify and authorize communications. Secrets are also used to authorize access to containerized applications which require a login. These credentials are widely used by public facing services as well as internal and external REST API’s everywhere. Examples include the AWS IAM access key, Google […]

Read More


Avatar photo
By: Fei Huang

June 8, 2018 2:59 pm

604 views

The ‘SambaCry’ Samba Vulnerability in Containers

There’s a new vulnerability which could affect containerized apps; this time it’s the Samba vulnerability affecting Linux networking. Samba allows non-Windows operating systems to share network shared folders, files, and printers with a Windows operating system. The network security space keeps catching people’s eyes recently with new exploits affecting popular systems. The […]

Read More


Avatar photo
By: Fei Huang

April 18, 2018 12:21 pm

1,044 views

The Ultimate Guide to Kubernetes Security

By Fei Huang and Gary Duan Containers and tools like Kubernetes enable enterprises to automate many aspects of application deployment, providing tremendous business benefits. But these new deployments are just as vulnerable to attacks and exploits from hackers and insiders as traditional environments, making Kubernetes security a critical component for all deployments. Attacks for ransomware, […]

Read More


Avatar photo
By: Fei Huang

October 31, 2017 12:40 pm

3,654 views

How to Deploy a Docker Container Firewall

By Gary Duan and Fei Huang Protecting Application Containers A Docker container firewall should be a ‘must-have’ requirement before deploying any container-based applications. In this post we’ll compare a couple ways to deploy a Docker container firewall –  manually vs. with a commercial solution such as NeuVector. However you choose to do […]

Read More


Avatar photo
By: Fei Huang

September 28, 2016 3:13 pm

745 views

Improving Docker Security: A Better Way to Secure Your Container Network

Using Linux containers like those enabled by Docker provides a perfect encapsulation method to package application components, or micro-services. Is there any need to worry about Docker security? Some would argue that just the process of deploying applications as container based micro-services improves overall security and reduces the applications attack surface. Let’s assume that […]

Read More