Like with any technology, Docker too has its own set of security concerns. Learn the Docker security best practices that will help keep your infrastructure and applications secure.
About Igor Livshitz
Igor is a cyber security expert with over 12 years of hands-on experience in a wide variety of technologies. Igor has vast experience in managing R&D teams in innovative projects and a proven track record of delivering great products tailored to the customers’ needs.
Entries by Igor Livshitz
A major vulnerability related to containers was released on Feb 12th. The vulnerability allows a malicious container that is running as root to break out into the hosting OS and gain administrative privileges.
A low interaction honeypot is simple to deploy and takes very little effort to maintain, but can never provide the benefits you can enjoy with the latest high interaction honeypot technology. When dynamic deception meets micro-segmentation, you have a truly risk-free decoy to fool attackers and learn about their behavior.
Implementing a sound micro-segmentation approach is one of the best steps that security teams can take to gain greater infrastructure visibility and secure critical applications, helping organizations protect high-value targets.
File integrity monitoring is an internal control that examines files to see the way that they change, and is essential for breach detection, giving you the granular, real-time information on every change to your files, including the who, what, where and when.
An attack vector is the way that an adversary can gain unauthorized access to your network or devices. What should smart businesses look out for, and how can they protect themselves against these increasingly sophisticated cyber attacks and threats?
Everyone knows about the many benefits of the cloud: it is infinitely scalable, developer-friendly, and easy to use. However, we often avoid addressing the reality that the cloud is not perfect. The truth is that, despite the cloud’s many merits, it presents a significant challenge from a security standpoint.
Containers and orchestration systems use numerous technical abstractions to support auto-scaling and distributed applications that obfuscate visibility into application communication flows…