InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
As more organizations look to deploy containers in public cloud providers, the number of solutions and types of container security tools designed to help continue to increase. This piece lists the top commercial and open source container and orchestration tools
to consider within a cloud environment, and offers recommendations for ensuring your architecture is secure, compliant and well-positioned for the future.
Containers allow a developer to package up an application with all the parts it needs, such as libraries and other dependencies, and ship it all out as one package. The container market is exploding, especially within cloud services like Amazon Web Services
(AWS), Google Cloud Platform (GCP) and Microsoft Azure. The options are plentiful, and the decision is usually made by developers.
Some top container tools available in cloud service provider (CSP) environments include (in alphabetical order):
Some container security monitoring tools to consider include (in alphabetical order):
The container security space continues to grow, and everyone wants a slice of the pie. We will see even more new technology disrupt the container market with the emergence of serverless, once stateful systems are supported or no longer needed.
The choices are plentiful, but these tools seem to be the most widely adopted and supported in the industry. Regardless of the public cloud provider your organization utilizes, this is a game of innovation, integration and scale.
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in
connection with such information, opinions, or advice.
May 19, 2022
By IANS Faculty
Understand potential security risks for executives on social media. Find information on attack trends and guidelines to help identify potential attacks and keep both social media accounts and the organization secure.
May 17, 2022
Learn how to make progress with zero trust, including common zero trust use cases, success stories, tooling guidance and tips for effectiveness.
May 12, 2022
Gain an understanding of the role executives play in incident response (IR). Find guidance on key actions to take before, during and after a security incident.