Latest News

alcide

IAM Role Pod Delegation Checks on AWS Kubernetes Clusters

You can never be too safe when it comes to securing your applications. It’s essential that security is a part of the application framework and not just a protective outer layer. Enterprises are swiftly adopting the microservices architecture because of its numerous benefits. However, security still remains a concern. Kubernetes has emerged as the de-facto container orchestration tool. And, on its own, Kubernetes seems to be decent for managing secrets.

alcide

The New Cloud-Native Security Paradigm- Exciting times for me to join Alcide!

It is clear beyond doubt cloud-native technologies are going to transform all we know about business, software and its supporting infrastructure. So I simply could not pass on the opportunity to join old friends to take part in this exciting paradigm shift to drive end-to-end cloud security so needed to protect this next wave of innovation. Here’s how my journey brought me to Alcide.

alcide

Secret-Hunting in Kubernetes

Applications and workloads running on Kubernetes environment, just like any application, requires secrets to gain access to data stored in the database, 1st / 3rd party services or APIs. Secrets, however, are only effective if they actually remain secret. When secrets leak, attackers will be able to gain access to sensitive data, services or APIs and can potentially put your entire environment and business at risk.

alcide

Kubernetes Vulnerability Scanning

For most organizations that have made investments in Kubernetes, ensuring the security of their Kubernetes environment is turning out to be a significant concern. As an example of why, consider the Kubernetes privilege escalation flaw (CVE-2018-1002105) announced in December 2018. The bug allows any user who has access to the subpath volume mounts to access files outside the volume as well.

alcide

How Kubernetes Empowers DevOps Culture

DevOps is a practice and enterprise-wide philosophy where your delivery chain is agile and adaptable, with automated processes used everywhere possible. Part of adaptability is having the confidence that you can incorporate new types of tooling and applications without introducing undue risk or unnecessary effort. The advantage of automation and integrated security is that developers can develop without fear, allowing them to support shift-left security.

alcide

Don't Let Kubernetes Become a Black Box: Optimizing the K8s Experience

Everyone is talking about Kubernetes these days, and it’s no secret that Kubernetes has emerged as the leading container orchestration tool. There are a variety of reasons for that, ranging from Kubernetes’s open source, community-based development model to helpful technical features like pod security policies and automatic load balancing.

alcide

Alcide Advisor: Continuous Kubernetes Security

Alcide Advisor is released to our Early Access program members. The Alcide Advisor Early Access Program provides an exclusive free access to our new Kubernetes and Istio hygiene advisor tool, before it's being released. The Alcide Advisor scans your Kubernetes deployments to look for any misconfigurations or secrets left behind.

alcide

Top 5 Best Practices for Healthy Kubernetes 1.14 Environments

If you work with Kubernetes, you’re probably already familiar with basic Kubernetes best practices guides and patterns. But the recent release of Kubernetes v1.14 has introduced some new features, which in turn necessitate new best practices. Most of them center on security and automation, which are top of the list for operations staff, management, and development alike. But there are some others that factor in as well.

alcide

Ready, Set, Go! Kick-Start Your K8s Journey with this 3-day Program

If you believe all the marketing hype, then Kubernetes is the silver bullet to make containers so routine that they’re boring, and your infrastructure will have better harmony than any boy band in history. If only this were true. While Kubernetes is a great tool for container orchestration, there are strict limitations on what it can do. That's why getting started with Kubernetes is much more complicated than simply installing it, starting it, and calling it a day.