Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Tigera: Protecting Against the Unpatched Kubernetes Vulnerability (CVE-2020-8554)

CVE-2020-8554 is a vulnerability that allows Kubernetes Services to intercept cluster traffic to any IP address. Users who can manage services can exploit the vulnerability to carry out man-in-the-middle (MITM) attacks against pods and nodes in the cluster. All Kubernetes versions including the latest release (v1.20) are vulnerable to this attack. If your cluster is multi-tenant, or allows unprivileged users to create and update services, you are impacted.

Tigera: How to address Kubernetes security challenges for managed Kubernetes services

As an increasing number of organizations are leveraging Managed Kubernetes Services such as EKS, AKS, or GKE for application development and production environment, DevOps, SREs would like to have security and observability built into their applications. Instead of managing a platform for Kubernetes security and observability, they would like to consume it too along with managed Kubernetes services. In this process, picking the right SaaS platform to address the Kubernetes security challenges is most important.

Tigera: Kubernetes on Windows: Addressing Critical Security and Observability Challenges

Windows containers provide a modern way to encapsulate processes and package dependencies, making it easier to apply DevOps practices for Windows applications. Windows container workloads are increasingly being orchestrated with Kubernetes. DevOps and SRE teams running applications in Windows Kubernetes environments are recognizing the need for greater security and observability as these workloads move into production. Many of these teams also need a unified Kubernetes-native solution that works across both Windows and Linux workloads.

Tigera: Web Application Firewall (WAF) in Kubernetes

With production workloads moving into the cloud, the adoption of the microservices architecture provides a solid and scalable communication method between workloads. Since most communication is via HTTP based APIs we can leverage existing web application firewalls technologies to provide HTTP protocol level detection. In this talk, we will show how you can leverage Calico Enterprise's integration with Fortinet's Fortiweb to provide WAF capabilities in a Kubernetes cluster.

Tigera: How to address Kubernetes security challenges for managed Kubernetes services

As an increasing number of organizations are leveraging Managed Kubernetes Services such as EKS, AKS, or GKE for application development and production environment, DevOps, SREs would like to have security and observability built into their applications. Instead of managing a platform for Kubernetes security and observability, they would like to consume it too along with managed Kubernetes services. In this process, picking the right SaaS platform to address the Kubernetes security challenges is most important.

Tigera: Calico Enterprise Multi Cluster Management - Federated Identity and Services

Managing multiple Kubernetes clusters can become time consuming and complex. Calico Enterprise can help with built in multi-cluster management capabilities to simplify deployment and ongoing operations, including securing interactions between the clusters, and providing cross-cluster service discovery.