Docker Security

Major Docker Security Hole Discovered

By Fei Huang A new docker vulnerability affecting container security,  CVE-2019-5736 was just announced, with some calling it a ‘Doomsday Docker Security Hole.’ This is just 2 months after the critical Kubernetes vulnerability was reported allowing attackers to take control of the api server. From one of the runc maintainers Aleksa Sarai: Aleksa stated that… Read more »

Container Security

How to Secure Containers in a Service Mesh such as Istio and Linkerd2

Visualize and Protect Service Mesh System and Application Containers with NeuVector By Chip Hwang We recently announced NeuVector integration with service meshes which enables powerful Layer 7 network inspection and protection of container traffic, even with pod to pod encryption on. This is an exciting technology leading capability from NeuVector which allows enterprises to protect… Read more »

Article, Network Security

NeuVector First to Deliver In-Depth Service Mesh Container Discovery, Visualization and Run-Time Protection

Adds critical network layer of security to the Istio and Linkerd2 service meshes for production Kubernetes deployments San Jose, CA – February 12, 2019 – NeuVector, the leader in container network security, today announced a new platform integration with the Istio and Linkerd2 service meshes that expands NeuVector’s security capabilities for production Kubernetes deployments. The… Read more »

Cloud Security

A Security Vision for the New World of Changing Perimeters

Rethinking Security at NeuVector – Micro-Perimeters By Gary Duan The application revolution has witnessed the traditional ‘hard-to-change’ monolith that is now broken down into smaller pieces, forming a focused microservices cloud-native architecture which requires ‘micro-perimeters’ for protection. The containerization of applications and their deployment into production are what really led to the introduction of the… Read more »

Container Security

How to Secure Containers Using the NIST SP 800-190 Guide

Container adoption is on the rise as organizations adopt microservices and convert monolithic applications to a container environment or build new applications in a cloud native fashion. As these applications move into production it becomes critical to secure containers against malicious attacks such as data stealing, malware, and crypto mining. NIST SP 800-190 focuses on… Read more »