<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=521127644762074&amp;ev=PageView&amp;noscript=1">
5 minute read
| March 14, 2024

Look Good & Gain Peace of Mind with Fairwinds' Managed Kubernetes

Identifying and remediating Common Vulnerabilities and Exposures (CVEs) as soon as possible is important for businesses, particularly when a new vulnerability is disclosed.... Read More
5 minute read
| February 27, 2024

K8s Benchmark Report: Are Organizations Meeting NSA Hardening Checks?

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) continue to update their Kubernetes hardening guidance, making... Read More
8 minute read
| February 13, 2024

Kubernetes Benchmark Report: Are Kubernetes Workloads More Secure in 2024?

Moving to the cloud remains a critical business initiative for most organizations. Indeed, the World Economic Forum once again focused on digital transformation this year,... Read More
8 minute read
| January 30, 2024

Fairwinds Insights Now Enables You to Find Critical GKE Vulnerability

The critical vulnerability recently disclosed by cloud security firm Orca impacts Google Kubernetes Engine (GKE) and could allow threat actors with a Google account to take... Read More
12 minute read
| July 5, 2023

Navigating Kubernetes and Cloud-Native Security

The era of cloud-native applications has arrived, and new security challenges have emerged for those developing cloud-native applications. Many modern business applications... Read More
17 minute read
| June 1, 2023

SOC 2 Compliance for Kubernetes with Fairwinds Insights

As the pace of digital transformation accelerates, many organizations are adopting Kubernetes for managing their containerized workloads. While Kubernetes brings scalability... Read More
7 minute read
| May 25, 2023

Fairwinds Insights Basics Tutorial: How to Check Host Port Configuration in Kubernetes

In Kubernetes, a host port configuration allows you to expose a port from your container to the host node's interface. This enables external systems to access a service... Read More
10 minute read
| April 13, 2023

How to Meet FedRAMP's Requirements for Container Vulnerability Scanning

The federal government continues to work to increase cybersecurity efforts in the United States, including, of course, in cloud environments. Specifically focused on cloud... Read More
7 minute read
| April 3, 2023

Kubernetes Basics Tutorial: Host IPC Should Not Be Configured

Containers are standard software units that package code with all its dependencies so you can run applications quickly and reliably in one computing environment or another.... Read More
7 minute read
| March 28, 2023

Empower Your Developers by Giving Them a Life Vest for Kubernetes Security

# Insecurity on the water I'm taking sailing lessons with my 12 year old son and he's as excited about it as I am. We have been out twice on a 37 foot sailboat with an... Read More
7 minute read
| March 17, 2023

Fairwinds Insights Basics Tutorial: Check Kubernetes Configuration for Privilege Escalation

Securing Kubernetes workloads is a critical aspect of increasing your overall cluster security. The goal is to ensure that your containers are running with minimal privileges... Read More
10 minute read
| March 14, 2023

Fairwinds Insights Basics Tutorial: Avoid Containers Running with Dangerous Capabilities

Containers are standard units of software that package code and its related dependencies to enable applications to run reliably in different computing environments. Container... Read More