Docker Containers
Nowadays enterprises are looking to transform software development practices to be agile to deliver more software faster. Container technology is...
Read More
Containers and the OWASP Top 10
The Open Web Application Security Project (OWASP) periodically publishes a list of the top 10 web application security risks. The...
Read More
Anomaly Detection Systems and Generalization
Network servers are always vulnerable to attacks. Therefore security measures to protect vulnerable software are an essential part of securing...
Read More
Container Security
To facilitate scalability and resilience, many organizations are running applications in cloud-native environments, with make use of containers and...
Read More
Preparation Phase, Identification Phase and Analyze Phase
Preparation Phase The significance of adequately utilizing the preparation phase in respect of virtual patching can't be overstated. Before dealing...
Read More
Virtual Patching in Vulnerability Management
Virtual patching demands applying a layer of security policy that prevents and intercepts vulnerability exploitation. A productive solution requires the...
Read More
WAF + RASP + Bot Mitigation + DDoS in Kubernetes Platform
There are many products out there that work as a WAF. WAF is not really aware of the application it...
Read More
PATCH MANAGEMENT
Patch Management is a strategic process of acquiring, testing, and installing updated software. But, most of the companies find themselves comply...
Read More
Why Is Virtual Patching So Important?
Virtual Patching gives a rapid way of a solution to provide web security. Even though the preferred solution is temporary,...
Read More
Why do we need to apply Virtual Patching on the websites?
Safeguarding the company's assets against existing and emerging vulnerabilities is the most critical task that security teams are struggling with....
Read More
Virtual Patching Tools
Various tools are used to achieve Deep Security virtual patching. It includes: Web Application Firewall (WAF) Intrusion Prevention System (IPS)...
Read More
Common Roadblocks to Source Code Fixes
From the technical point of view, the initial mitigation strategy would be for an organization to rectify the discovered vulnerability...
Read More
Advantages of Virtual Patching
Today’s systems can be considered as very advanced as well as complex, with multiple dependencies and interrelationships. It requires a...
Read More
Virtual Patching: Definition
The term patch is misleading because the vulnerable system is not being patched. A quick repair job for a piece...
Read More
Introduction to Virtual Patching
“Virtual Patching” is a term that was initially used by Intrusion Prevention System vendors many years ago. It is also...
Read More
How to create a Kubernetes Service
With the running application, we want to access one service. Let’s create a ClusterIP type of service. We can: Create...
Read More
Kube-Proxy and Headless Services
Kube-Proxy Kube-proxy implements a form of virtual IP for services for all types except ExternalName. Three modes are: (a) Proxy-mode:...
Read More
Kubernetes Service Types
Key Terms Nodes: Virtual host(s) on which containers/pods are running. Kubernetes Service: A logical set of pods that perform identical...
Read More
Introduction to Kubernetes Services
Key Terms: Pods: One or more containers that shares the storage and network with a Kubernetes configuration, mentioning the behavior...
Read More