Shift Left, Then Right for Runtime Application Container Security

Glen Kosaka Container Security

In this new Solution Showcase by Enterprise Strategy Group (ESG), Senior Analyst Doug Cahill reviews recent research on application container adoption trends, then outlines how to build security into the DevOps and SecOps use cases. Abstract: The broad adoption of application containers for both new applications and those being refactored into a microservices architecture has created the need for purposeful …

OpenShift Security Automation

Glen Kosaka Container Security

Containers and tools like Red Hat OpenShift enable enterprises to automate many aspects of application deployment, with many significant business benefits. But it’s easy to forget to automate the security aspects of containers. There are many built-in features for OpenShift security automation in the platform, but don’t stop there. Automating run-time security for OpenShift deployments is just as critical for …

Open Source Security

Achieving Open Source Security in Container Environments

NeuVector Cloud Security

By Tim Mackey, Technology Evangelist , Black Duck by Synopsys This is a guest post from NeuVector partner Black Duck Software. Today, open source components are at the heart of most modern applications, transforming how we architect solutions in every industry. Black Duck’s 2017 Open Source Security and Risk Analysis of over 1000 commercial applications revealed that 96% of applications scanned utilized …

How to Enforce DNS-based Egress Container Security Policies in Kubernetes and Openshift

Gary Duan Container Security

By Gary Duan While more and more applications are moving to a microservices and container-based architecture, there are legacy applications that cannot be containerized. Access to these applications need to be secured with egress container security policies when containers are deployed with Kubernetes or Red Hat OpenShift. These legacy applications include database servers and applications developed with .NET frameworks. The …

Equifax Data Breach Analysis – Container Security Implications

NeuVector Container Security

By Gary Duan The Equifax data breach is one of the largest and costliest customer data leaks in history. Let’s take a closer look at the vulnerabilities and exploits reportedly used. Could the use of containers have helped protect Equifax? We’ll examine how proper security in a container based infrastructure helps to make application security more effective. The Apache Struts …