Live Webinar – Kubernetes Security Best Practices (Nov 21, 10am PT) REGISTER TODAY
{ .link_text }}
Living Up to Our Unicorn Potential

Living Up to Our Unicorn Potential

StackRox has done it again. We’ve been recognized once more for our leadership role in the industry – this time as a finalist in the Black Unicorn Awards for 2019 at Black Hat, on now in Las Vegas. This award recognizes those cyber security innovators that judges deem have the potential to reach a $1 billion market potential. Cyber Defense Magazine chose just 30 finalists amongst all entries. Cyber security industry veterans Gary Miliefsky of Cyber Defense Magazine, Robert Herjavec of Herjavec Group, and David DeWalt of NightDragon served as the judges for this year’s Black Unicorn awards.

How to Remediate Kubernetes Security Vulnerability: CVE-2019-11247

How to Remediate Kubernetes Security Vulnerability: CVE-2019-11247

A new Kubernetes security vulnerability was announced today, along with patch releases for the issue for Kubernetes versions 1.13, 1.14, and 1.15. CVE-2019-11247 discloses a serious vulnerability in the K8s API that could allow users to read, modify or delete cluster-wide custom resources, even if they only have RBAC permissions for namespaced resources. If your clusters aren’t using Custom Resource Definitions (CRDs), you aren’t affected. But CRDs have become a critical component of many Kubernetes-native projects like Istio, so many users are impacted.

Istio Security: Running Microservices on Zero-Trust Networks

Istio Security: Running Microservices on Zero-Trust Networks

In our previous blog post about the Istio service mesh, we provided an overview of Istio’s features and capabilities and why you may (and sometimes may not, at least not yet) want to use it as a service mesh in your Kubernetes clusters. In this post, we’ll dive a little deeper into how Istio can help improve the runtime security of the applications in a service mesh and where it fits in the broader picture of Kubernetes security controls and practices.

StackRox Wins Gold in 2019 Network Products Guide

StackRox Wins Gold in 2019 Network Products Guide

The awards just keep rolling in … We are thrilled to announce that StackRox has been chosen as a Gold Winner at the 14th Annual Network Products Guide’s 2019 IT World Awards in the Security Services category. StackRox was recognized for our container-native and Kubernetes-native security solution to help our customers protect containers and Kubernetes environments throughout the container life cycle. Containers and Kubernetes have drastically accelerated and streamlined cloud-native application development and deployment, with organizations across industries containerizingtheir most critical production workloads at an ever increasing pace.

Top 5 Takeaways from State of Container and Kubernetes Security Report

Top 5 Takeaways from State of Container and Kubernetes Security Report

We recently repeated our survey of IT and security practitioners to understand the state of security in your container and Kubernetes environments. In our inaugural survey last year, the key findings included: Lack of adequate security strategy topped the list of container strategy concerns Runtime was the lifecycle phase that was of most concern from a security perspective Kubernetes was used by just over half (57%) of respondents for container orchestration This time around we expanded the audience from 230 to more than 390 IT and security practitioners.

StackRox Earns CRN’s Kudos as 2019 Emerging Vendor

StackRox Earns CRN’s Kudos as 2019 Emerging Vendor

Right on the heels of winning two CODiE awards, StackRox was just named a Computer Reseller News 2019 Emerging Vendor. StackRox and our Kubernetes-native container security platform were chosen for our ability to help organizations harden and secure Kubernetes environments at scale. DevOps practices and the cloud-native stack provide the channel with rich opportunities to help companies enable business transformation. The underlying technologies of containers and Kubernetes, however, wreak havoc with traditional security tooling and processes.

Kubernetes Security 101: Top challenges, risks, best practices

Kubernetes Security 101: Top challenges, risks, best practices

Kubernetes is by far the most widely used container orchestrator in the market, and Kubernetes adoption – especially in production environments – is taking off. According to Gartner, “by 2022, more than 75% of global organizations will be running containerized applications in production.” The explosion in Kubernetes adoption hasn’t been without its share of security concerns. Earlier this year, the runC vulnerability, which allows an attacker to gain host-level code execution by breaking out of a running container, was discovered.

Another Industry First – StackRox Included on the DHS CDM Approved Products List

Another Industry First – StackRox Included on the DHS CDM Approved Products List

StackRox has long-standing roots in helping to secure the cloud-native stacks at a variety of Federal Government agencies. Over the past two years, we’ve earned contracts with the Department of Homeland Security (DHS) Science and Technology Directorate (S&T)”) and have secured an investment and technology development agreement with In-Q-Tel. Today we’re excited to share the latest milestone in our work with U.S. Government agencies – the StackRox Kubernetes Security Platform has been added to the DHS Continuous Diagnostics and Mitigation (CDM) Approved Products List (APL).

Gartner: How-To Guide on Securing Containers

Gartner: How-To Guide on Securing Containers

This is the third article of a three-part blog series reviewing Gartner Security & Risk Management Summit 2019. Don’t forget to read article one titled Gartner’s Top 10 Security Projects for 2019 - Container Security Makes the List, and article two titled Gartner on Securing Cloud-Native Apps. We’ve been sharing the highlights of Gartner’s recent Security conference – the inclusion of container security in Gartner’s list of Top 10 Security Projects for 2019 and Best Practices for Securing Cloud-native Apps.

Gartner on Securing Cloud-Native Apps

Gartner on Securing Cloud-Native Apps

This is the second article of a three-part blog series reviewing Gartner Security & Risk Management Summit 2019. Don’t forget to read article one titled Gartner’s Top 10 Security Projects for 2019 - Container Security Makes the List, and article three titled Gartner: How-To Guide on Securing Containers. Properly implemented, cloud-native apps will be the most secure applications your organization has ever developed or deployed. So began analyst Neil MacDonald in his talk on “Security Patterns and Best Practices for Securing Cloud-native Applications” at the recent Gartner security summit.

Gartner best practices for Kubernetes & container security

Gartner best practices for Kubernetes & container security

Container usage for production deployments in enterprises is still constrained by concerns regarding security, monitoring, data management and networking. So begins the Gartner report, listing those concerns as the number one key challenge limiting container adoption. The cost of bolting on security later in the container lifecycle is steep, and making substantial changes to your infrastructure to move from dev/test into prod means you won’t realize one of the key advantages of containerization - namely, speed.