Feb 5, 2019
Portland, OR, USA
Feb 13, 2019   |  By Theo Despoudis
Containers are a revolutionary technology that allow you to run applications and their required dependencies in an isolated environment, packaged as a single image, which improves reusability and portability, and containers are more lightweight to use compared to virtual machines. In the rush to adopt containers and benefit from their advantages, many companies have moved their software infrastructure into the containerized world.
Feb 11, 2019   |  By John Morello
Earlier today (11 Feb 2019), a new vulnerability in runc was announced. This vulnerability allows container escape simply by running a malicious image. When the malicious image is run, it exploits a defect to then overwrite the runc binary on the host, thereby allowing unlimited control of both the host itself and any other containers running on it. The vulnerability affects LXC as well and the LXC patch includes a good description of the underlying mechanics of the attack.
Feb 6, 2019   |  By Twain Taylor
It’s 2019, and IT organizations everywhere are supposed to be living and breathing DevOps and DevOps Security. But the fact is that many are not. Data show that a mere 17 percent of organizations have fully adopted DevOps. The rest are likely still stuck with the comparatively inefficient, slow-moving delivery and vulnerability management processes associated with Agile.
Feb 5, 2019   |  By Sonya Koptyev
It’s 2019, and Docker containers are old news — or at least, they’ve become so mainstream that they are no longer a cutting-edge technology. You could say the same about microservices architectures, Kubernetes, serverless functions, service meshes, and many of the other cloud-native infrastructure technologies that have been at the forefront of innovation over the past several years.
Feb 4, 2019   |  By Maame Efua Boham
Ever since the cloud became a thing about a decade ago, we’ve been inundated with warnings (such as here, here and here) about how the cloud can pose security risks. In reality, the cloud is not inherently insecure, despite what some people may imply. Nonetheless, there are important steps that users of cloud services need to take to secure their cloud-based environments and workloads — especially those that cloud vendors themselves cannot effectively secure.
Feb 5, 2019   |  By Twistlock
While organizations at first tended to view the cloud as a complement to their existing infrastructures, cloud-based resources and services have evolved into the default means of deploying applications. Cloud adoption rates across a range of businesses and industries have reached 96 percent, and almost 90 percent of all data center workloads run in the cloud.
Feb 5, 2019   |  By Twistlock
This is the 2nd ebook from The New Stack’s series focused on the Kubernetes ecosystem. Unlike the 1st ebook that centered on the state of the Kubernetes ecosystem, this ebook shines a light on answering the question: How well does Kubernetes work in production?
Feb 1, 2019   |  By Twistlock
Organizations moving their software assets into the cloud are discovering that when it comes to IT security, they have entered an alternate universe. It’s a place where security objectives have not changed, but the way to achieve them is completely different. Is this a safe place? How are people managing their cloud native security?
Feb 1, 2019   |  By Twistlock
As organizations look to build, deploy and manage cloud-native applications at scale, many are evaluating and choosing Kubernetes ecosystem. The New Stack provides an in-depth look at Kubernetes and the ecosystem that has emerged around this leading container orchestration tool. This ebook serves as a primer for both newcomers, assessors and implementers who are looking to make the most of the ecosystem of products and services emerging around Kubernetes.
Jan 1, 2019   |  By Twistlock
As containers gain mainstream momentum, the cloud native ecosystem is experiencing rapid growth of new technologies and projects that are spinning off and expanding from the initial core of containers. One particularly intense area of innovation is in workload deployment/management. There are many options in the cloud-native environment and the differences between these technologies are often small and nuanced.
Feb 12, 2019   |  By Twistlock
In this special episode of the Cloud Native Security Podcast, we discuss the RunC and Docker vulnerability discovered yesterday: CVE-2019-5736.
Feb 12, 2019   |  By Twistlock
In this episode, Neil Carpenter discusses and demonstrates the enhancements in the Twistlock 18.11 release that expand on and make Kubernetes Service Account Monitoring simpler and more secure.
Feb 12, 2019   |  By Twistlock
In this episode, Jacob Graves discusses and demonstrates the updates in the Twistlock 18.11 release that integrate Prometheus for alerting.
Feb 12, 2019   |  By Twistlock
In this episode, Neil Carpenter talks through the demonstrates how Twistlock 18.11 integrates with Istio to visually show vulnerabilities in your Istio components, and actionable ways to fix them.
Feb 12, 2019   |  By Twistlock
In this episode, James Jones discusses and demonstrates the updates in the Twistlock 18.11 release that enhance the way Lambda functions are secured.