Mountain View, CA, USA
Nov 20, 2020   |  By Kamal Shah
As we close another inspirational KubeCon and look ahead to future gatherings, let’s also pause to reflect on the accomplishments we’ve achieved together as members of the cloud-native community.
Nov 19, 2020   |  By Michael Foster
On Tuesday during KubeCon, the Cloud Native Computing Foundation (CNCF) announced the Certified Kubernetes Security Specialist certification is now generally available. The announcement confirmed important information that we previously outlined in our most recent blog detailing the CKS.
Nov 16, 2020   |  By Jamie Scott
As the brainchild behind the Borg project – the predecessor to Kubernetes – Google Cloud is at the forefront of enabling the move towards microservices architectures, containerization, and Kubernetes. As the only Kubernetes-native container security solution provider, StackRox is a leader in Kubernetes Security and has partnered with Google Cloud on several fronts to help joint customers secure their cloud-native stack and address their share of the security responsibility.
Nov 16, 2020   |  By Michael Foster
This is part three of our four-part OpenShift security blog series. Don’t forget to check out our previous blog posts in the series: Part 1 - OpenShift security best practices for designing clusters Part 2 - OpenShift networking and cluster access best practices Adhering to best practices for running your workloads in OpenShift is critical to keeping the cluster and all its workloads safe.
Nov 12, 2020   |  By Michael Foster
The CKS is the third Kubernetes based certification backed by the Cloud Native Computing Foundation (CNCF). CKS will join the existing Certified Kubernetes Administrator (CKA) and Certified Kubernetes Application Developer (CKAD) programs. All three certifications are online, proctored, performance-based exams that will require solving multiple Kubernetes security tasks from the command line.
Nov 10, 2020   |  By Michael Foster
This blog post is part two of a four-part blog series where we discuss various OpenShift security best practices for The concept of zero-trust security has emerged to address the new security challenges of cloud-native architecture. These challenges include: Microservice architecture creates a more extensive network attack surface. To address this issue, administrators and developers will have to ensure both external networks and internal software-defined networks are securely configured.
Nov 3, 2020   |  By Michael Foster
Red Hat’s OpenShift Container Platform (OCP) is a Kubernetes platform for operationalizing container workloads remotely or as a hosted service. OpenShift enables consistent security, built-in monitoring, centralized policy management, and compatibility with Kubernetes workloads. The rapid adoption of open source projects can introduce vulnerabilities in standard Kubernetes Environments.
Nov 2, 2020   |  By Steve Giguere
Application security has matured, transformed, “shifted left”, been rebranded, de-centralised and even to an extent re-centralised over the past 10 years. Keeping up with what is relevant, with a keen eye on what is coming, is a juggling act of Cirque du Soleil proportions and something that even the keenly enthused must work above and beyond to get a firm yet perpetually slippery grasp on.
Oct 30, 2020   |  By Nick Sappa
StackRox partners with AWS on many fronts, in large part because so many StackRox customers run our platform in their Amazon Elastic Kubernetes Service (EKS) environments. As the world’s most popular managed Kubernetes service, EKS – like all other AWS services – operates under a shared responsibility model for security.
Oct 28, 2020   |  By Viswajith Venugopal
Today, I’m excited to announce the launch of KubeLinter , a new open source project from StackRox! KubeLinter analyzes Kubernetes YAML files and Helm charts, and checks them against a variety of best practices, with a focus on production readiness and security. Scroll down to watch a video overview of KubeLinter.
May 30, 2020   |  By StackRox
Speaker: Andy Clemenko, Solutions Engineer, StackRox
Apr 6, 2020   |  By StackRox
Learn about the best practices and recommended approaches to implementing a successful DevSecOps program
Mar 18, 2020   |  By StackRox
George Gerchow, chief security officer at Sumo Logic, talks about applying security early in the app dev process and how leveraging the Kubernetes-native architecture of StackRox fits perfectly into that mandate.
Feb 25, 2020   |  By StackRox
In this StackRox video, Karen Bruner takes a wide-ranging look at the current features and limitations of the managed Kubernetes services from the three largest cloud service providers: Amazon’s Elastic Kubernetes Service (EKS), Microsoft’s Azure Kubernetes Service (AKS), and Google Kubernetes Engine (GKE). We hope that by presenting this information side-by-side, both current Kubernetes users and prospective adopters can see their options or get an overview of the current state of managed Kubernetes.
Feb 25, 2020   |  By StackRox
For many DevOps teams, Kubernetes has become an enterprise IT mandate, but like previous waves of infrastructure change, Kubernetes security best practices must be followed throughout the container life cycle.
Feb 25, 2020   |  By StackRox

In this webinar, you’ll learn:

  • The top security and privacy challenges confronting cloud-native enterprise stacks.
  • Why a focus on Kubernetes-native security is crucial to securing containers.
  • Ways to leverage Kubernetes-based security to simplify compliance, operations and triage.
Feb 25, 2020   |  By StackRox
Google wraps a lot of great services around Google Kubernetes Engine (GKE), its managed Kubernetes service. But even with Google taking on so much infrastructure setup and management, you still have responsibilities for significant aspects of security and compliance.
Feb 25, 2020   |  By StackRox
The recent Kubernetes security audit and the issues it identified got lots of publicity. But did you know that the audit reports also include many recommendations you can apply today to improve your security posture?
Feb 25, 2020   |  By StackRox
Join us to get your questions answered on how to improve security and reduce your blast radius while increasing velocity in cloud-native environments.
Feb 10, 2020   |  By StackRox
Download to learn about: Key Kubernetes security considerations you must be aware of, Operationalizing built-in Kubernetes security features (RBAC, admission controllers, network policies), Security best practices for building/deploying containers as well as protecting your containerized apps during runtime, and How StackRox helps customer secure their containers and Kubernetes across build, deploy, and runtime phases.
Mar 3, 2019   |  By StackRox
Download our definitive guide to implementing a container security strategy across the application development life cycle.
Mar 1, 2019   |  By StackRox
Download this guide to learn about the container security challenges to complying with PCI DSS and how StackRox helps bring your container environment into compliance with PCI DSS.
Feb 1, 2019   |  By StackRox
The State of Container Security report was written to understand how container and Kubernetes adoption trends intersected with security concerns.
Jan 1, 2019   |  By StackRox
If you run workloads in Kubernetes, you know how much important data is accessible through the Kubernetes API-from details of deployments to persistent storage configurations to secrets. The Kubernetes community has delivered a number of impactful security features in 2017 and 2018, including Role-Based Access Control (RBAC) for the Kubernetes API.
Dec 1, 2018   |  By StackRox
Download our security toolkit for valuable tips and practical suggestions on how to harden containers and hosts as a first step toward a more secure container environment.
Nov 1, 2018   |  By StackRox
Containers have generated plenty of fear, uncertainty, and doubt in the blogosphere about what's needed to secure them. They are ephemeral, they are too numerous to count, they talk to each other (East-West) more than they communicate with the outside World (NorthSouth), and they are typically part of a fast-moving continuous integration/continuous deployment (CI/CD) freight train.
Oct 1, 2018   |  By StackRox
Download to learn about the 9 security settings that you should check immediately to help ensure your Kubernetes environment is secure
Sep 1, 2018   |  By StackRox
As you evolve your security strategy and seek out new solutions to protect your application container environments, consider these 5 essential aspects to ensure the most effective threat protection, along with minimal DevOps toolchain friction and improved security management.

The StackRox Kubernetes Security Platform protects your applications across the entire container life cycle. The software discovers your full container environment, ensures assets adhere to your security policies, and identifies and stops malicious actors. Continuously improving security – that’s StackRox.

Containers offer intrinsic security benefits but at the same time increase the attack surface. The StackRox Kubernetes Security Platform maximizes the inherent security advantages of containers – immutability and declarative configuration – to help you harden your container environment. Our software integrates with tooling across the container ecosystem to provide the industry’s best risk profiling, highlighting those assets that need an immediate fix.

Why Customers Choose StackRox?

  • Reduce your Attack Surface: StackRox enforces service-centric deployment policies on vulnerabilities and configurations in your images and orchestrator settings to mandate fixes during the build phase. The StackRox software can block services from deploying if they violate critical policies. You can also set the StackRox software to allow services with non-critical risks to deploy, but immediately issue notifications to your dev teams with remediation suggestions and instructions. Finally – you can run fast AND run safe.
  • Profile Runtime Risk: StackRox prioritizes the most critical security issues to address. The StackRox software provides this risk profiling by tapping into a broad set of factors, including orchestrator settings, network policies, secrets usage, container configuration, and other metrics. StackRox provides an automated means to profile and monitor your highest-risk assets during runtime, automatically elevating those assets with potential signs of attacker activity to the top of your queue. Finally – a pragmatic, context-based approach to managing your security program.
  • Detect and Respond: StackRox leverages continuous machine learning to adapt its understanding of your application environment. Constantly tuning its settings, the StackRox software minimizes false positives and false negatives. You can also set response options, including alerts and killing containers, to meet your needs. Finally – detection that adapts to the dynamic world of containers.

Security Across Your Entire Container Life Cycle.