Avatar photo
By: Glen Kosaka

December 12, 2021 1:29 pm

2,725 views

Critical Vulnerability in Apache Log4j 2 (CVE-2021-44228)

A critical, high severity vulnerability (CVSS v3.0 10/10 rating) in the Apache Log4j open source Java logging library was disclosed Thursday, December 9 on the foundation’s github page. On Wednesday, Dec 15 a new vulnerability CVE-2021-45046 was published and patched, according to this article. This was the result of an incomplete initial […]

Read More


Avatar photo
By: Fei Huang

February 3, 2021 11:33 am

1,523 views

Don’t let Kubernetes break your SOC2 compliance

OverviewIt was said “The world's most valuable resource is no longer oil, but data.”  Whether this is true or not, data breaches remain one of the top security challenges for modern enterprises . One recent example that shook security professionals is the SolarWinds attack that impacted […]

Read More


Avatar photo
By: Fei Huang

June 8, 2018 2:59 pm

604 views

The ‘SambaCry’ Samba Vulnerability in Containers

There’s a new vulnerability which could affect containerized apps; this time it’s the Samba vulnerability affecting Linux networking. Samba allows non-Windows operating systems to share network shared folders, files, and printers with a Windows operating system. The network security space keeps catching people’s eyes recently with new exploits affecting popular systems. The […]

Read More


Avatar photo
By: Neuvector

September 18, 2017 3:18 pm

1,367 views

Equifax Data Breach Analysis – Container Security Implications

By Gary Duan The Equifax data breach is one of the largest and costliest customer data leaks in history. Let’s take a closer look at the vulnerabilities and exploits reportedly used. Could the use of containers have helped protect Equifax? We’ll examine how proper security in a container based infrastructure helps to make […]

Read More


Avatar photo
By: Neuvector

August 18, 2017 2:53 pm

690 views

OpenShift Container Security

OpenShift Security for Network Visibility and Runtime Protection RedHat OpenShift and Kubernetes provide the tools to deploy and manage containers at scale. But how can OpenShift security be integrated into the workflow? In this briefing, NeuVector CTO Gary Duan introduces the docker container threat landscape and the Openshift security requirements for the Build, Ship, and […]

Read More