Achieve and Enforce GDPR Compliance for Containers & Kubernetes

Glen Kosaka Cloud Security

The GDPR (General Data Protection Regulation) for the protection of privacy provides both specific and vague requirements for personal data protection by enterprises. Therefore, the path to GDPR compliance is murky and ambiguous. For modern cloud-native deployments such as containers and using Kubernetes it can be even more confusing for security and compliance teams. While GDPR contains many provisions which …

NeuVector First to Demonstrate Red Hat OpenShift ‘CIS Inspired’ Security Benchmarks

Glen Kosaka Container Security

Today NeuVector demonstrated its ‘tech-preview’ implementation of important draft security benchmarks for the Red Hat OpenShift Platform. These benchmarks, drafted by the Red Hat OpenShift team and inspired by the CIS Benchmarks for Kubernetes, provide an important and much needed set of security auditing checks for the deployment of OpenShift. The benchmarks, similar to the ones for Kubernetes, evaluate the …

How to Protect Secrets in Containers Using DPI and DLP

Fei Huang Cloud Security

By Fei Huang Every cloud application and service utilizes a key (secret) to identify and authorize communications. Secrets are also used to authorize access to containerized applications which require a login. These credentials are widely used by public facing services as well as internal and external REST API’s everywhere. Examples include the AWS IAM access key, Google API access token, …

docker container firewall

How to Protect Web Applications in Containers Using DPI and DLP

Glen Kosaka Container Security

Protect Kubernetes Applications with Your Existing Threat Rules By Fei Huang The software security industry has grown very quickly in the past decades, and companies large and small are all using some type of network and endpoint security solution. These include solutions for anti-virus, anti-malware, web application firewall (WAF), layer 7 next generation firewall, penetration testing, threat intelligence, SIEM alerting …

NeuVector Certified Red Hat Operator Now Available through Red Hat Marketplace

Glen Kosaka Cloud Security

The NeuVector Container Security Platform is now available through Red Hat® Marketplace, an open cloud marketplace that makes it easier to discover and access certified software for container-based environments across the hybrid cloud. Through the marketplace, customers can take advantage of responsive support, streamlined billing and contracting, simplified governance, and single-dashboard visibility across clouds. The NeuVector certified Red Hat Operator …