Latest News

alcide

Are You a Kubernetes Pro or a Kubernetes Novice?

I'm a fan of online surveys. It's a fun, simple, and a great way to check the pulse of our community. We launched our first survey back in 2018, where we looked at the state of securing cloud workloads. We then continued the motion in 2019 with The Kubernetes Adoption and Usage survey and most recently with the Helm survey, still open for feedback. In this blog post I'd like to focus on the 2019 Alcide Kubernetes survey.

alcide

PCI Compliance for DevOps and SecOps Teams

The Payment Card Industry (PCI) Security Standards Council administers the Payment Card Industry Security Data Security Standard (PCI DSS). It's a standard that any organization that stores, processes or transmits cardholder data, must comply with. It's not new, it's well understood, and there are a multitude of companies that have sought and achieved compliance over the many years since its introduction.

alcide

Prevent Costly Mistakes that Expose Your Kubernetes Service

In Kubernetes, a Service is an abstract way to expose an application running on a set of Pods as a network service With Kubernetes you don’t need to modify your application to use an unfamiliar service discovery mechanism. Kubernetes gives Pods their own IP addresses and a single DNS name for a set of Pods, and can load-balance across them.

alcide

Alcide Integrates with Datadog to Enable Easy Kubernetes Audit Logs Monitoring and Investigation

Announcing Alcide new integration with Datadog, the leading monitoring platform. Users will now get insights and alerts from Alcide kAudit in real-time in order to detect Kubernetes compliance violations, security incidents, and administration activity anomalies directly from the Datadog platform.

alcide

Pod Security Policy

The Pod Security Policy, sometimes called PSP in short, is a Kubernetes resource that allows the enforcement of policy rules during the creation phase of a Pod. When a PodSecurityPolicy resource is created, it does nothing. In order to use it, the requesting user or target pod’s service account must be authorized to use the policy, by allowing the use verb on the policy.