Apple encrypts its iCloud data on Google, AWS clouds

The cloud market has seen an exponential increase in 2020 and this trend was observed amid the steepest economic contraction in modern history. Therefore, it may not come as a surprise that Apple, a major player in the cloud industry, has emerged as Google’s largest customer of cloud data services, according to a report. Another report states that Apple spent $300 million for Google cloud storage services in 2021 alone, a 50% increase from last year. Even though this seems like a big amount, it is worth it. According to Law Floyd, director of cloud services at Telos, using Google Cloud makes sense as it is exponentially faster and cheaper, as opposed to obtaining more data centre space, power, cooling, and equipment.

Read more

HOW KUBERNETES WAF CAN HELP ENTERPRISES ?

Cloud computing has become the new norm, especially during & post- pandemic world. With businesses moving online, cloud security is a major concern for cloud storage users & providers.  Insecure APIs, DDoS attacks, sensitive information breaches are the few major threats challenging industries including healthcare, e-commerce, government, finance, and even education.

Read more

Securing Container Contents

The core to any container security effort is testing the code and supplementary components which will execute within containers, and verifying that everything conforms to security and operational practices. One of the vital progresses over the past year or so is the initiation of security features for the software supply chain, from the packaging of container and runtime environments including CoreOS’s Rocket, Docker, OpenShift, and so on.

Read more

The Need for Container Security

The explosive growth of containers is foreseeable in the future. The technologies like Docker alleviate various issues for developers deploying applications. Developers prefer a quite simple packaging, rapid deployment, lessen environmental dependencies, horizontal scalability, support for micro-services, and generalized management – all of which containers can provide. It is quite compelling that when a single technology provides us to address different technical issues at once. The generic model of packaged services, where the environment is designed to treat every container as a “unit of service”, sharply limits the transparency and audit-ability by design, and provides the security pros nightmares. It is possible to run additional code and faster but should accept the container’s inside visibility loss.

Read more

Threats to Containers

Understanding the container security areas that need to be focused on and particular control recommendations helps to understand which threat needs to be addressed and the areas containers affect most. A few issues and threats are well-known, some are purely lab PoC, and others are threat vectors which offenders have yet to exploit.

Read more

Container Runtime Protection

Runtime Security in Kubernetes deployment might be policed based on a pod-by-pod.  A pod is a group of containers that shares a network namespace, which can underlying mechanisms for runtime security is identical.  The potential to do granular runtime security builds specialist container security tooling a compelling prospect, especially for enterprises with a lot at risks, such as healthcare organizations or banks.

Read more

Docker Containers

Nowadays enterprises are looking to transform software development practices to be agile to deliver more software faster. Container technology is emerging as the preferred means of packaging and deploying applications. To granularly customize policies down to the exact syscall allowed on a host, docker brings a whole set of isolation capabilities to containerized applications with strong defaults out of the box to the ability for IT admins.

Read more

Containers and the OWASP Top 10

The Open Web Application Security Project (OWASP) periodically publishes a list of the top 10 web application security risks. 

The OWASP Top 10 is a useful resource for making any internet-connected application more secure against the most common types of attack. The container-specific recommendation that comes up most to scan container images for known vulnerabilities in third-party dependencies. While it will fail to catch some things, specifically some exploitable flaws in your application source code will probably give you the biggest bang per buck of any preventative tool that you can introduce into a containerized deployment.

Read more

Anomaly Detection Systems and Generalization

Network servers are always vulnerable to attacks. Therefore security measures to protect vulnerable software are an essential part of securing a system. Anomaly detection systems can enhance the state of affairs as they can separately learn a model of normal behavior from a set of empirical observations. Then uses the model to discover novel attacks.

Read more