Portland, OR, USA
Jun 13, 2019   |  By Chris Tozzi
A multi-cloud infrastructure is any type of IT infrastructure that mixes a public or private cloud with at least one other type of environment. Hybrid clouds, which combine public or private cloud infrastructures with an on-premises environment, are one example of a multi-cloud infrastructure. Companies that choose to use more than one public cloud (such as AWS and Azure) at once are also relying on a multi-cloud infrastructure.
Jun 12, 2019   |  By Michael Churchman
Container registry security is easy to overlook. But you fail to secure container registries at your peril. This is true whether you use containers from public registries, private registries, or both. Your container ecosystem is only as secure as its least secure container — and that container’s security depends, in part, on the registry from which you pulled the original container image. Why is this true? We’ll explain in this post.
Jun 10, 2019   |  By Chris Tozzi
In a perfect world, every organization would have a dedicated team of IT security experts whose sole mission was to enforce security best practices and address vulnerabilities across all layers of the organization. These people would spend their days making sure the code developers write is as secure as possible, checking and double-checking access control configurations, scanning container images for the least sign of trouble, and keeping the DDoS botnets at bay.
Jun 6, 2019   |  By Chris Tozzi
With dozens of Kubernetes distributions available, deploying Kubernetes is easier than ever. What can be trickier is keeping Kubernetes secure. Despite what you might think, many Kubernetes distributions are not as secure as they could be out of the box. And even if they are, there’s always more you can do to improve security.
Jun 5, 2019   |  By Jeremy Adams
The Twistlock for Pivotal Cloud FoundryⓇ(PCF) tile is now generally available . Customers are running our tile in their production environments. Get the Twistlock for PCF tile from the Pivotal Network to try it out.
Feb 5, 2019   |  By Twistlock
While organizations at first tended to view the cloud as a complement to their existing infrastructures, cloud-based resources and services have evolved into the default means of deploying applications. Cloud adoption rates across a range of businesses and industries have reached 96 percent, and almost 90 percent of all data center workloads run in the cloud.
Feb 5, 2019   |  By Twistlock
This is the 2nd ebook from The New Stack’s series focused on the Kubernetes ecosystem. Unlike the 1st ebook that centered on the state of the Kubernetes ecosystem, this ebook shines a light on answering the question: How well does Kubernetes work in production?
Feb 1, 2019   |  By Twistlock
Organizations moving their software assets into the cloud are discovering that when it comes to IT security, they have entered an alternate universe. It’s a place where security objectives have not changed, but the way to achieve them is completely different. Is this a safe place? How are people managing their cloud native security?
Feb 1, 2019   |  By Twistlock
As organizations look to build, deploy and manage cloud-native applications at scale, many are evaluating and choosing Kubernetes ecosystem. The New Stack provides an in-depth look at Kubernetes and the ecosystem that has emerged around this leading container orchestration tool. This ebook serves as a primer for both newcomers, assessors and implementers who are looking to make the most of the ecosystem of products and services emerging around Kubernetes.
Jan 1, 2019   |  By Twistlock
As containers gain mainstream momentum, the cloud native ecosystem is experiencing rapid growth of new technologies and projects that are spinning off and expanding from the initial core of containers. One particularly intense area of innovation is in workload deployment/management. There are many options in the cloud-native environment and the differences between these technologies are often small and nuanced.
Jun 17, 2019   |  By Twistlock
Twistlock supports EC2, ECR, ECS, EKS, AWS Fargate, Security Hub, and AWS Lambda. Twistlock can automatically discover all the cloud native services you’re using across all your accounts and regions and show you a global view their relative risk state.
Jun 11, 2019   |  By Twistlock
Twistlock CTO John Morello describes a metaphor for running VMs the old way VS. running VMs the new way as "Cattle VS. Pets".
Jun 4, 2019   |  By Twistlock
Twistlock CTO John Morello defines the term Cloud Native Workload Protection, and how it relates to Twistlock's foundational focus on containers.
Jun 4, 2019   |  By Twistlock
Twistlock CTO John Morello whiteboards the evolving security needs of a cloud native organization, including:
    , Underlying compute options for running cloud native applications (eg. VMs, containers, serverless), Private and/or Public clouds, potentially w/different providers, Ancillary services that you used to enable that cloud native application (eg. orchestrators, registries, ci/cd tools)
May 2, 2019   |  By Twistlock
Watch this webinar featuring speakers 451 Research Senior Analyst Fernando Montenegro and Twistlock CTO John Morello.