Dyn DDOS Attack Reminds Us To Secure Everything – Even Containers

Glen Kosaka Container Security

If there’s any lesson to be taken away from the recent DDoS attack on Dyn it’s that we are all under the constant threat of attack no matter how small or how big we are. Even the largest, most heavily defended service providers can be hacked. We probably hear about less than 1% of all the successful and unsuccessful attempts because …

Deploy on VMware Photon and Kubernetes Securely

Glen Kosaka Network Security

The announcement of the VMware Photon platform and its built-in support for Kubernetes is good news for enterprise developers. VMware Photon Platform is an Enterprise Cloud Infrastructure Platform which enables IT to deliver on-demand tools and services developers need to build and run modern applications while retaining security, control and performance of their datacenters. Production enterprise applications still require additional …

NeuVector provides run-time container security for the Alibaba-Docker partnership

Glen Kosaka Cloud Security

Today NeuVector announced that customers of Alibaba-Cloud, the cloud service provider for Alibaba Group, can now secure their Docker container deployments with NeuVector. For companies running business critical, container-based services in the cloud, NeuVector provides the run-time visibility and security required to protect containers against attacks, vulnerabilities, and unauthorized access. This announcement comes at the same time as the Docker …

15 Tips for a Run-time Container Security Strategy

Fei Huang Container Security

By Fei Huang There’s been a lot of recent discussions online about container security, but most have focused on image scanning or the host and OS security. The lack of enterprise security tools for containers has caused people to focus too narrowly.  It’s like the old saying “when all I have is a hammer, everything looks like a nail.” Security …

Securing East-West Traffic in a Container-based Data Center

NeuVector Network Security

Enterprise applications moving into the cloud, either public or private, is one of the most prominent trends in the tech industry. A lot of attention has been placed on how to setup the data center environment and deploy applications in recent years, but little attention has been paid to securing east-west traffic. As the infrastructure became mature through innovations in …