Avatar photo
By: Glen Kosaka

December 12, 2021 1:29 pm

1,375 views

Critical Vulnerability in Apache Log4j 2 (CVE-2021-44228)

A critical, high severity vulnerability (CVSS v3.0 10/10 rating) in the Apache Log4j open source Java logging library was disclosed Thursday, December 9 on the foundation’s github page. On Wednesday, Dec 15 a new vulnerability CVE-2021-45046 was published and patched, according to this article. This was the result of an incomplete initial […]

Read More


Avatar photo
By: Glen Kosaka

March 12, 2019 11:28 am

391 views

Container Segmentation Strategies and Patterns

At a recent container security conference the topic of ‘container segmentation patterns’ came up, and it became clear that many security architects are wrestling with how to best segment workload communication in the dynamic environment of containers. The question was also raised “Is the DMZ dead?” The concept of network segmentation has […]

Read More


Avatar photo
By: Glen Kosaka

September 13, 2018 11:52 am

1,143 views

How Kubernetes Networking Works – Under the Hood

  By Tobias Gurtzick Kubernetes networking is a complex topic, if not even the most complicated topic. This post will give you insight on how kubernetes actually creates networks and also how to setup a network for a kubernetes cluster yourself. This article doesn’t cover how to setup a kubernetes cluster itself, you […]

Read More


Avatar photo
By: Glen Kosaka

April 18, 2018 12:17 pm

699 views

How Kubernetes Networking Works – The Basics

Kubernetes 101 Before I get into Kubernetes networking, here are the basic concepts to know about in Kubernetes. For those not familiar with Kubernetes, these are the objects and terms used in a Kubernetes deployment. Kubernetes is a container orchestration and management tool for automating the deployment and monitoring of containers. Kubernetes is supported by […]

Read More


Avatar photo
By: Glen Kosaka

March 22, 2018 12:28 pm

168 views

Kubernetes System Security – Protecting Against Kubelet Exploits

By Andson Tung As critical as it is to protect application containers deployed by Kubernetes, it is just as critical to protect the Kubernetes system containers from attacks or from being used in an attack. In this post I’ll focus on one important Kubernetes security area – protecting the Kubelet, which manages the pods […]

Read More


Avatar photo
By: Glen Kosaka

November 13, 2017 12:37 pm

112 views

NeuVector Launches New Version of Container Firewall Security Solution

Release enhances Layer 7 container firewall protections, adds new host and container threat mitigation, and speeds enterprise integration San Jose, CA – November 13, 2017 – NeuVector, which delivers continuous network security for containers, today announced the immediate availability of NeuVector 1.3, the most significant release of the container firewall security solution since […]

Read More


Avatar photo
By: Neuvector

September 13, 2017 12:45 pm

740 views

Web Application Firewall vs. Container Firewall

How is a Container Firewall Different Than a Web Application Firewall? By Gary Duan Application containers provide an efficient way to deploy and manage applications, including web facing ones. But with containerization, securing applications has become even more challenging. I often get asked for the comparison of a web application firewall vs. container firewall. I […]

Read More


Avatar photo
By: Neuvector

September 8, 2017 2:47 pm

366 views

Next Generation Firewall vs. Container Firewall

What’s a Container Firewall? And how is it different than a Next Generation Firewall? By Gary Duan Containers and microservices are revolutionizing computing. But can firewalls help secure these? Next Generation Firewalls (NGFW) were supposed to handle the latest threats and data center designs, but fall short in the new cloud microservices environments. Here’[…]

Read More


Avatar photo
By: Neuvector

August 18, 2017 2:53 pm

183 views

OpenShift Container Security

OpenShift Security for Network Visibility and Runtime Protection RedHat OpenShift and Kubernetes provide the tools to deploy and manage containers at scale. But how can OpenShift security be integrated into the workflow? In this briefing, NeuVector CTO Gary Duan introduces the docker container threat landscape and the Openshift security requirements for the Build, Ship, and […]

Read More