Author: David Bisson

David Bisson is an information security writer and security junkie. He's a contributing editor to IBM's Security Intelligence and Tripwire's The State of Security Blog, and he's a contributing writer for Bora. He also regularly produces written content for Zix and a number of other companies in the digital security space.

Kubernetes adoption is up. According to DevPro Journal, organizations’ use of the container management platform increased to 83% in 2020—up from 78% in the previous study. This growth reflects the promise of Kubernetes in minimizing application downtime. According to its documentation, the platform helps to keep critical apps up and running by load balancing the network traffic, changing the actual state of deployed containers to a desired state defined by the user at a gradual rate and killing containers that don’t accord with specified health checks. Notwithstanding that promise, Kubernetes is giving rise to security concerns that are undermining organizations’…

Read More

Organizations increased their use of Kubernetes in 2020. According to DevProJournal, a 2020 report found that organizations’ use of Kubernetes had grown to 83 percent over the course of that year. That’s up from 78% in 2019. These findings reflect the benefits that Kubernetes brings to organizations. According to its documentation, Kubernetes helps organizations to manage their containers in a way that ensures their applications don’t suffer downtime. For instance, the container orchestration management platform comes with load balancing capabilities that help to distribute the network’s traffic when it’s too high. This feature helps to prevent the container from going…

Read More

You did it! You set up a Kubernetes system to orchestrate your containers. This will help you support your customers with faster application development and management. Let’s be clear, though. Your work doesn’t end there. If you really want to serve your customers, you need to make sure you’ve taken security into consideration. The last thing you want is for an attacker to exploit a security vulnerability and then move laterally throughout your network and follow up with stealing your or your customers’ sensitive information. Fortunately, you can use a Kubernetes network policy to prevent that type of lateral movement.…

Read More