Blog

3 Best Practices for Detecting Attack Vectors on Kubernetes Containers

3 Best Practices for Detecting Attack Vectors on Kubernetes Containers

In recent years, the adoption of microservices and containerized architectures has continually been on the rise, with everyone from small startups to major corporations joining the push into the container world. According to VMWare, 59 percent of large organizations surveyed use Kubernetes to deploy their applications into production. As organizations move towards deploying containers in …

3 Best Practices for Detecting Attack Vectors on Kubernetes Containers Read More »

Cybersecurity & Container Security, Forecasting Organization Adoption To Minimize Threats

Cybersecurity & Container Security, Forecasting Organization Adoption to Minimize Threats

The use of containers is growing rapidly and for good reason. Compared to traditional, monolithic applications, containers offer many great benefits: faster delivery, elasticity, portability—the list goes on. In a recent press release, Gartner predicted by 2022, more than 75 percent of global organizations will be running containerized applications in production and by 2024, container …

Cybersecurity & Container Security, Forecasting Organization Adoption to Minimize Threats Read More »

DevSecOps & Department of Defense, Separating Agile Hype From Legitimate Practice

DevSecOps & Department of Defense, Separating Agile Hype From Legitimate Practice

Agile software development has become a tried and true practice for delivering high quality and effective software in the modern age. Due to its effectiveness, agile development is not only being used by tech companies; it has also been picked up by the Department of Defense (DoD). With the advancement of technology to the forefront …

DevSecOps & Department of Defense, Separating Agile Hype From Legitimate Practice Read More »

Anchore Integration With Azure DevOps Has Arrived

Anchore Integration With Azure DevOps Has Officially Arrived

Anchore is excited to announce the official release of our integration with Azure DevOps. Azure DevOps is a powerful tool from Microsoft that allows developers to build and release production software. This integration with Anchore allows developers to seamlessly integrate security into their Azure DevOps pipelines with very little effort. Anchore’s robust scanning brings not …

Anchore Integration With Azure DevOps Has Officially Arrived Read More »

Cloud Native Security For DevOps Applying The 4 C's As Security Best Practice

Cloud Native Security For DevOps, Applying The 4 C’s As Security Best Practice

The past decade has seen a massive surge in terms of “cloud” technologies. What used to require on-premises hardware that took up large amounts of space, power and talent to operate efficiently, now can be operated by a small number of DevOps engineers and scaled up or down to meet demand and performance requirements. These …

Cloud Native Security For DevOps, Applying The 4 C’s As Security Best Practice Read More »

Shifting Security Left A Real World Guide To DevSecOps

Shift Left With A Real World Guide To DevSecOps

A Free Resource: Shifting Security Left, A Real World Guide To DevSecOps Taking your team from DevOps to a DevSecOps approach brings different functions together to achieve better business outcomes, as well as reduce workload fatigue. Alignment across developer, security and operations disciplines depends more on implementing a culture of collaboration that embraces the talent …

Shift Left With A Real World Guide To DevSecOps Read More »

Leverage the benefits from open source building blocks and protect your organization from risks and vulnerabilities without losing velocity.

The Open Source Economy & Modernizing Security To Reduce Vulnerability Risk

In February 2020, the Linux Foundation released a report titled “Vulnerabilities in the Core,” a detailed analysis of the usage and security implications of open source software across the computing landscape. In today’s blog post, we will discuss some of the findings contained in the report, and explore how it pertains to the field of …

The Open Source Economy & Modernizing Security To Reduce Vulnerability Risk Read More »

Jenkins At Scale With Anchore Vulnerability Scanning & Compliance

Jenkins at Scale With Anchore Vulnerability Scanning & Compliance

In this blog, we’ll see how we can configure Jenkins on our Kubernetes clusters to scale on-demand, allowing for hundreds or thousands of pipeline jobs per day. Additionally, we’ll see how easy it is to incorporate Anchore vulnerability scanning and compliance into these pipelines to make sure we aren’t deploying or pushing insecure containers into …

Jenkins at Scale With Anchore Vulnerability Scanning & Compliance Read More »

Cryptocurrency Mining Attacks Anchore Policy Line Of Defense

Cryptocurrency Mining Attacks & Anchore Scanning, A Line of Defense

Cryptocurrency Mining Attacks Shifting Left Recently, there has been a flurry of cryptocurrency mining attacks hitting various entities around the globe ranging from celebrity Twitter accounts to customers running workloads across Kubernetes clusters. For today, we’ll ignore the celebrity accounts and focus on how Anchore can be used to protect your organization from cryptomining attacks. …

Cryptocurrency Mining Attacks & Anchore Scanning, A Line of Defense Read More »