Avatar photo
By: Glen Kosaka

September 8, 2021 8:12 am

3,152 views

How to Use NeuVector with the Mitre Att&ck Framework

There are many attack vectors for cloud-native Kubernetes and container deployments, some new and some traditional. To help organizations learn about these and protect against them, MITRE has published a knowledge base of techniques and tactics in a new matrix focused on containers. The newly published ATT&CK® for Containers provides container-specific attack vectors […]

Read More


Avatar photo
By: Glen Kosaka

May 8, 2021 10:03 am

3,890 views

How to Use Terraform to Deploy Secure Infrastructure as Code

How to Ensure that the Infrastructure Remains Secure and Applications Are Secured Before Deployment (more…)[…]

Read More


Avatar photo
By: Glen Kosaka

April 17, 2021 10:21 am

4,271 views

An Introduction to Secure Infrastructure as Code (IaC) Using Terraform

A hot topic these days is Infrastructure as Code, or IaC, and how to use tools like Terraform to deploy IaC. There are tremendous benefits for following Infrastructure as Code principles, one of which is security, or Security as Code. What is Infrastructure as Code (IaC)?Infrastructure as Code enables modern infrastructures such as cloud […]

Read More


Avatar photo
By: Glen Kosaka

September 17, 2020 11:46 am

1,330 views

NeuVector Integrates with Sonatype Nexus Lifecycle to Secure Containers Across the SDLC

As DevOps teams continue to ‘shift security left’ and build container security into the pipeline, integrated toolchains for managing security risk early in the software development lifecycle (SDLC) are becoming critical. The Sonatype Nexus Lifecycle integration with NeuVector enables developers and DevOps teams to manage software vulnerabilities throughout the entire SDLC and even into […]

Read More


Avatar photo
By: Glen Kosaka

August 21, 2020 12:44 pm

1,726 views

Protect Kubernetes Containers on AWS Using the Shared Responsibility Model

Editor's note: This post was updated on August 17, 2022 Deploying an AWS container security solution is a critical requirement to protect your data and assets running on AWS, including EC2, EKS, ECS, Kubernetes, or RedHat OpenShift. In its ‘Shared Responsibility Model,’ AWS states that the security responsibility is shared between AWS and […]

Read More


Avatar photo
By: Glen Kosaka

May 14, 2020 12:15 pm

1,614 views

How to Protect Web Applications in Containers Using DPI and DLP

Protect Kubernetes Applications with Your Existing Threat Rules By Fei Huang The software security industry has grown very quickly in the past decades, and companies large and small are all using some type of network and endpoint security solution. These include solutions for anti-virus, anti-malware, web application firewall (WAF), layer 7 next generation firewall, penetration […]

Read More


Avatar photo
By: Glen Kosaka

April 20, 2020 12:20 pm

1,421 views

10 Steps to Automate Container Security Into the CI/CD Pipeline

How to Implement Container Security Automation Into the Kubernetes Pipeline Enforcing security and compliance requirements in modern cloud-native pipelines can be a challenge without at least some level of container security automation. The increased attack surface of container infrastructures makes security even more important, but security and DevOps teams can’t afford to slow the […]

Read More


Avatar photo
By: Glen Kosaka

March 26, 2020 12:23 pm

1,430 views

End-to-End Vulnerability Management for Images, Containers and Kubernetes

NeuVector 3.2 Release Adds a Vulnerability & Compliance ‘Explorer,’ High Performance Scanner, and Host Process Protection   The ‘Shift-Left’ movement to build security into the CI/CD pipeline continues to grow. Vulnerability management is a critical component of this, and organizations must ‘Shift-Left, then Shift-Right‘ in order to fully […]

Read More


Avatar photo
By: Glen Kosaka

February 25, 2020 12:26 pm

1,971 views

How to Optimize I/O Intensive Containers on Kubernetes

Understanding the Real-time Characteristics of Linux Containers By Jay Huang Highly threaded, I/O intensive Linux containers running on Kubernetes should be able to use the full extent of their CPU requests. But is this really possible? Understanding how the Linux operating system schedules tasks and allocates CPU time to tasks can help application developers optimize […]

Read More