How to secure a Kubernetes cluster

This post was originally published by DAVID BISSON. More and more organizations are adopting Kubernetes, but they’re encountering security challenges along the way. In the fall 2020 edition of its “State of Container and Kubernetes Security” report, for instance, StackRox found that nearly 91% of surveyed organizations had adopted Kubernetes, with a majority (75%) of participants revealing […]


This post was originally published by (ISC)² Management. Last week, IBM’s Security Intelligence blog reported on the highly-discussed cybersecurity skills shortage – and in particular, how some areas are lacking in talent more than others. “Software development is one of the areas most starved of security attention,” wrote Irene Michlin. Read more here:

Secure Your Azure Deployments With Cloud Secure

This post was originally published here by Edward Smith. Consumption of public cloud infrastructure services continues to increase, requiring security teams to maintain a comprehensive and up-to-date inventory of cloud assets in-use across multiple environments, such as Azure and AWS, throughout their enterprise. According to 451 Group, 69 percent of organizations plan to be running a multi-cloud […]

How to keep your Gmail account safe from hackers

Nowadays, every online service is being linked to your email account or your phone number and this is what is giving hackers an access point to explore your secrets-if/when the user shows laxity in securing their respective accounts. Keeping aside mobile phone security, for now, let’s talk about email security. Google mail or shortly called […]

Have you heard the news? CloudPassage has debuted Container Secure!

This post was originally published here by casey pechan. This morning we announced one of the most important updates to the CloudPassage Halo platform to date: Container Secure; an all-encompassing set of automated compliance and security controls for containers. Our Container Secure solution is the only one currently on the market that secures all three parts […]

Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!