Serverless and containerizations trends, Post-Kubernetes open-source computing, Container Sandboxing, Datadog & Container Security and more
Not rendering correctly? View this email as a web page here.
Serverless and containerizations trends, post-Kubernetes open-source computing, Container Sandboxing, Datadog and Container Security, Tech comparisons resources and more.
2018 is behind us, and what a year it was for cloud native... it seems that every major organization is now either deploying Kubernetes, or planning to. As we gear up to 2019, we're excited with the prospects of what it might bring. We started the year with some interesting webinars with Datadog and about container sandboxing, and there's plenty more to come - watch this space!
News You Can Use
Mitigating the Security Risks of Cloud-Native Applications Enterprises are implementing multiple technologies like Kubernetes for orchestration and serverless functions, then deploying them "continuously" into production. The window for the security team to properly review the application and its infrastructure has become much shorter, if it still exists at all... Read on DarkReading ›
Finding equilibrium in post-Kubernetes open-source computingAs Kubernetes is leveraged as the foundation for an increasing number of critical enterprise technologies and enables the new industry standard of hybrid cloud, open-source participants are reckoning with both the challenge and opportunity of working within a new collaborative digital economy...Read on Silicon Angle ›
Training and certification for acloud nativeworld As more and more companies are focusing on digital transformation, cloud native skill sets are growing in demand. It's still early days, but it's important for many IT professionals - and companies - to begin looking into training so as not to get left behind.Read on IDGConnect ›
Aqua Security Partners with Datadog to Advance Container Security ...as cybersecurity becomes more distributed across the enterprise, the way cybersecurity metrics are consumed also will need to evolve. With that goal in mind, Aqua Security has partnered with Datadog, a provider of IT monitoring services, to make it easier to consume security metrics alongside IT operational data. Read on Container Journal ›
Kubernetes Master Class: Getting Your Hands "Dirty" in a Container Sandbox
A session about "sandboxing" techniques to isolate containers and improve their security posture. We'll cover the background on the rise of "sandboxing" technology, drill down into different container "sandboxing" technologies and projects, examine and compare the different sandboxing initiatives, hardware based initiative (containers "enclaves") as opposed to legacy Linux isolation tools applied for Containers (SELinux and Seccomp), and demonstrate the attack types sandboxing/isolation technologies can or cannot mitigate. Register Here ›
Aqua News
Amazon Firecracker: Isolating Serverless Containers and FunctionsFrom a security standpoint, Firecracker and all isolation technologies focus on one aspect of security – they aim to restrict the blast-radius of an attack emanating from a container or function. They won’t prevent or mitigate a direct attack on application running inside containers or functions, and should not be regarded as obviating other critical aspects and layers of security Read on Aqua Blog ›
Best of Both Worlds: Keep your Apps Performant & Secure using Datadog and AquaIf your infrastructure is running a high load, how can you know whether that's a normal operation or a hacker who's just using your servers to mine bitcoins? In this webinar, we'll show you a better approach to securing containers and how the right combination of monitoring and security tools keeps your systems performant, reliable and secure.Watch Webinar ›
How To Save IT From Drowning In Its Own Self-Containerised World (and other stories)enterprises are deploying containers and other tools to help build and ship applications faster – solutions designed to be easy-to-use and to improve developer agility – not with production deployments and associated security requirements in mind. Aqua’s view is right there with my own – a solution is not to slow deployments down, it’s to automate the operations and security processes around these tools so everyone wins Read on ComputerWeekly ›
The Azure Podcast Partner Spotlight - Aqua SecurityLiz Rice, Technical Evangelist at Aqua Security and master of all things Security in Kubernetes, talks to us about her philosophy on security and gives us some great tips-n-tricks on how to secure your container workloads in Azure, on-prem or any cloud.Listen on The Azure Podcast ›
Security Considerations for Cloud Foundry Container Runtime vs. Cloud Foundry Application Runtime
This webinar describes how to approach the divergent needs of Cloud Foundry Container Runtime vs. Cloud Foundry Application Runtime, and the methods and tools that can be used to mitigate risk without slowing down development. Watch Webinar ›
Ready to Secure your Cloud Native Apps?
Aqua provides a container security platform that enables enterprises to secure their cloud-native, container-based and serverless applications from development to production.