Avatar photo
By: Glen Kosaka

March 12, 2019 11:28 am

5,031 views

Container Segmentation Strategies and Patterns

At a recent container security conference the topic of ‘container segmentation patterns’ came up, and it became clear that many security architects are wrestling with how to best segment workload communication in the dynamic environment of containers. The question was also raised “Is the DMZ dead?” The concept of network segmentation has […]

Read More


Avatar photo
By: Glen Kosaka

March 1, 2019 11:38 am

3,410 views

How to Protect Sensitive Data in Containers with Container DLP

We recently announced the industry’s first Container DLP capability to help enterprises protect sensitive data. Let’s take a deeper look into data loss prevention (aka data leak protection) and how it applies to containers. What is Data Loss Prevention (DLP)? DLP solutions help detect potential sensitive data violations and prevent accidental or malicious […]

Read More


Avatar photo
By: Glen Kosaka

February 12, 2019 11:41 am

4,320 views

How to Secure Containers in a Service Mesh such as Istio and Linkerd2

Visualize and Protect Service Mesh System and Application Containers with NeuVector By Chip Hwang We recently announced NeuVector integration with service meshes which enables powerful Layer 7 network inspection and protection of container traffic, even with pod to pod encryption on. This is an exciting technology leading capability from NeuVector which allows enterprises to […]

Read More


Avatar photo
By: Glen Kosaka

September 13, 2018 11:52 am

11,096 views

How Kubernetes Networking Works – Under the Hood

  By Tobias Gurtzick Kubernetes networking is a complex topic, if not even the most complicated topic. This post will give you insight on how kubernetes actually creates networks and also how to setup a network for a kubernetes cluster yourself. This article doesn’t cover how to setup a kubernetes cluster itself, you […]

Read More


Avatar photo
By: Glen Kosaka

August 15, 2018 12:06 pm

2,623 views

Achieving PCI Compliance for Containers

Although microservices and containers are not explicitly mentioned in PCI-DSS for PCI compliance, organizations implementing these technologies must focus carefully on monitoring, securing, and governance. Microservices and containers offer some unique characteristics that support pci compliance. For example, microservices emphasize an architecture with one function per service/container. This aligns well with PCI-DSS 2.2.1, […]

Read More


Avatar photo
By: Glen Kosaka

April 18, 2018 12:17 pm

4,898 views

How Kubernetes Networking Works – The Basics

Kubernetes 101 Before I get into Kubernetes networking, here are the basic concepts to know about in Kubernetes. For those not familiar with Kubernetes, these are the objects and terms used in a Kubernetes deployment. Kubernetes is a container orchestration and management tool for automating the deployment and monitoring of containers. Kubernetes is supported by […]

Read More


Avatar photo
By: Glen Kosaka

March 22, 2018 12:28 pm

2,370 views

Kubernetes System Security – Protecting Against Kubelet Exploits

By Andson Tung As critical as it is to protect application containers deployed by Kubernetes, it is just as critical to protect the Kubernetes system containers from attacks or from being used in an attack. In this post I’ll focus on one important Kubernetes security area – protecting the Kubelet, which manages the pods […]

Read More