The Essential Guide to Cloud-Native Security

Cloud-native security protects applications designed and built on the cloud. On a higher level, “cloud native” is a fundamentally new approach to application design and deployment, leveraging native cloud capabilities …

Docker Security 101: Key Considerations

Docker provides lightweight virtualization that allows multiple isolated Linux systems running on the same host. Unlike traditional virtualization, which virtualizes the hardware, containers virtualize the operating system.  Multiple running containers that …

One Kernel Bug Away: Why Container Security is Such a Challenge

Containers are revolutionizing the way we do application development, but, as with most new technologies, their adoption in the enterprise is (rightfully) hindered by genuine security concerns. Ultimately, containers can …

Nine Reasons Why the Death of the Security Appliance Is Inevitable

Most security organizations are used to appliances being the workhorse for their protection needs. Indeed, the major security vendors today tend to have huge appliance businesses, including the old titans (e.g., …

Time to Blow Up the SOC?

Thirty-seven percent of SOCs faced more than 10,000 alerts per day and more than half of those were false positives, which can easily cost organizations thousands of wasted hour and …