Download our latest report - State of Container Security DOWNLOAD NOW
StackRox Named Most Innovative Company in 2019 Cybersecurity Excellence Awards

StackRox Named Most Innovative Company in 2019 Cybersecurity Excellence Awards

StackRox has pioneered the industry’s most innovative security solution for Kubernetes and containers. Today we’re proud to announce that we’ve won in the Most Innovative Company category of the Cybersecurity Excellence Awards. This award recognizes our relentless drive to enable secure Kubernetes and container environments and protect our customers’ vital cloud-native applications. The 2019 Cybersecurity Excellence Awards honor companies, individuals, and products that innovate in information security. What’s unique about this award is that it relies on validation from the information security community.

StackRox is All In on Kubernetes – and It Makes Your Container Security Better

StackRox is All In on Kubernetes – and It Makes Your Container Security Better

In a news release today, we detailed new capabilities in the latest version of the StackRox Kubernetes Security Platform that enable better visibility, more nuanced risk profiling, and more streamlined network policy enforcement. In every case, these new features derive directly from our deep integrations with Kubernetes. About a year ago, we faced a difficult decision – continue our support of a broad array of orchestrator platforms or narrow our focus to supporting just Kubernetes.

StackRox – Putting the Customer at the Center of Kubernetes Security

StackRox – Putting the Customer at the Center of Kubernetes Security

When we officially launched the StackRox Kubernetes Security Platform about 18 months ago, we highlighted that microservices, containers, and Kubernetes were the next stage in the evolution of application development in the cloud-native stack. While DevOps embraced microservices and its advantages in delivering unprecedented speed, efficiency, and portability, security teams were frequently left in the dark or brought in a little too late. Today, security teams are proactively working with DevOps to ensure that their organization’s security and compliance requirements are adequately addressed before new apps go live.

Must-Have Capabilities When Evaluating Container Security Solutions

Must-Have Capabilities When Evaluating Container Security Solutions

More and more organizations are transforming their businesses by embracing DevOps principles, microservice design patterns, and container and orchestrator technologies such as Docker and Kubernetes. While security teams have the same mission regardless of the technology stack in use – keep the bad guys out and find and stop them if they do break in – the tools and tactics security staff employ must change to accommodate this infrastructure shift.

7 Critical Kubernetes Security Issues Resolved by Upgrading Your k8s

7 Critical Kubernetes Security Issues Resolved by Upgrading Your k8s

In 2018, we learned about several Kubernetes security vulnerabilities, with the latest Kubernetes security flaw being the most severe. The last few Kubernetes releases have both introduced new security features and also provided critical security patches to help resolve some of the most impactful Kubernetes security issues and shortcomings to date. As you start the new year, take a look at the version of your Kubernetes clusters. If you are still using an older version, we highly recommend you promptly upgrade to the latest release.

Top 5 Container and Kubernetes Security Posts of 2018

Top 5 Container and Kubernetes Security Posts of 2018

The year 2018 was a watershed for containers, container security, and Kubernetes. Tesla got hacked, the most critical Kubernetes vulnerability to date was discovered, IBM bought RedHat for $34 billion (in large part for OpenShift), VMware bought Heptio for more than $500 million, and investors poured money into container technology startups at an ever-increasing pace. The Following five blog articles capture and distill the big picture trends in container adoption and Kubernetes security in 2018.

6 Container Security Best Practices You Should Be Following

6 Container Security Best Practices You Should Be Following

The advent of containers has not only made application development and deployment simpler, scalable, and portable but also enabled more inherent security compared to traditional application development technologies and methodologies. You can leverage many inherent security advantages as you move applications to containers – even if you’re porting a monolithic app and not yet adopting microservices. With containers, you can: Minimize your attack surface much more effectively than is possible with a virtual machine (VM) or bare metal server by reducing functionality in the container to the bare minimum set of processes, image components, filesystem access, and other settings.

Kubernetes First Major Security Vulnerability Discovered

Kubernetes First Major Security Vulnerability Discovered

The tech industry press has been abuzz this week with news of the first major security hole discovered in Kubernetes, with coverage in ZDNet, The Stack, and TechTarget’s Search IT Operations. Given the prevalence of Kubernetes in organizations’ tech stacks and the fact that it’s the first discovered security flaw, the news is pretty big. Here at StackRox, we were surprised in a couple ways – first, with its scope, and second, that it wasn’t discovered earlier.

Survey Says … Security Tops the List of Container Strategy Concerns

Survey Says … Security Tops the List of Container Strategy Concerns

This week StackRox launched the industry’s first ever State of Container Security report. To compile the findings, we surveyed more than 230 IT leaders across operations and security roles. Some responses came as no surprise – the dominance of Docker and Kubernetes, for example, or the breadth of industries using containers to accelerate application roll out. But many results did surprise us – including the extent to which security leads the list of concerns about companies’ container strategies.

Why We Chose StackRox - Guest Post and Video from Mux

Why We Chose StackRox - Guest Post and Video from Mux

Today we posted the news that we’ve adopted StackRox to secure our environment. I wanted to share a bit about our thought process and results in hopes of helping others like us. Security is difficult to manage at every level of technology development, from building a simple web app to running enormous platforms like the tech giants manage — recent tech headlines just prove this point. Like other early-stage SaaS startups, we here at Mux face the combined challenges of having limited resources, a relatively large technology footprint, and the obvious focus on building strong product features.

So happy to join the StackRox Family

So happy to join the StackRox Family

I am thrilled to share the news that after taking a year-long sabbatical, I have joined the team here at StackRox! I enjoyed nearly five years at Skyhigh Networks, running products and marketing and having a great time with the team. We were acquired by McAfee this past January, and I took this year to really dig in on what I wanted to do next. I want to send a huge shout out to all the investors, technologists, executives, and security professionals who took time out of their busy schedules to meet with me this year to share valuable insights and learnings.