Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Containers

On-Prem and Kubernetes: A delicate relationship

In cloud security, context is everything. In the previous two installments of our Customers Care Chronicles, we wrote about how a security vendor needs to be a true business partner and the potential headaches when migrating tools in the cloud. In this installment, we tackle another non-security concept that happens to be crucial for security: environment.

Why identities are the new perimeter in the cloud

In the ever-expanding world of cloud computing, one thing has become glaringly clear: identities are no longer just user profiles—they are the keys to the kingdom. As businesses race to harness the power of the cloud, they must also confront a growing menace: the risk posed by poorly managed identities. Imagine leaving your front door unlocked in a neighborhood known for break-ins — that’s what weak identity management is like in the cloud.

Synthetic Backup: The Future of Kubernetes Data Protection

Traditional backup methods, though useful, often struggle to keep up with the complexities and constant changes in Kubernetes environments. This is where synthetic backup comes in—a revolutionary approach that significantly improves data protection. In this article, we explore what synthetic backup is and why it’s a better option than traditional methods. We discuss the specific benefits it offers for Kubernetes applications, including real-world examples and technical insights.

Cloud identity insights - Detect at the edge in real time

Cloud attacks strike fast. Prevention used to be enough, but not anymore. And legacy EDR tools fall short because they lack visibility into cloud identities and behavior. Defenders need the ability to detect at the edge - in real time - and correlate early stage identity behavior to see what's happening fast.

Advantages of Calico's DNS Policy Implementation over Cilium's DNS Policy Implementation

DNS policies play a critical role in managing and securing workload communication for cloud-native applications running on Kubernetes clusters. Two popular options for implementing DNS policies are Calico and Cilium. While both have their merits, Calico’s approach offers several distinct advantages over Cilium’s, particularly in terms of flexibility, scalability, and overall operational simplicity.

Sysdig's AI Workload Security: The risks of rapid AI adoption

The buzz around artificial intelligence (AI) is showing no sign of slowing down any time soon. The introduction of Large Language Models (LLMs) has brought about unprecedented advancements and utility across various industries. However, with this progress comes a set of well-known but often overlooked security risks for the organizations who are deploying these public, consumer-facing LLM applications.

Code Lens Evaluation with Regal and the OPA VS Code extension

Our VP of Marketing, William Chia, in a conversation with our DevRel lead Anders Eknert about the new Code Lens Evaluation feature that just landed in Regal. A conversation that quickly turns into a demo! Watch to see how the feedback loop of Rego development now is shorter than ever, and will change the way you author your policies. Rego development experience taken to a whole new level!

Runtime anomaly detection in Kubernetes: enhancing security through context-aware profiling

Runtime anomaly detection is fast becoming a critical component for protecting containerized environments. Recent advancements in this field are addressing long-standing challenges and introducing innovative approaches to enhance security posture.