InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
As more organizations look to deploy containers in public cloud providers, the number of solutions and types of container security tools designed to help continue to increase. This piece lists the top commercial and open source container and orchestration tools
to consider within a cloud environment, and offers recommendations for ensuring your architecture is secure, compliant and well-positioned for the future.
Containers allow a developer to package up an application with all the parts it needs, such as libraries and other dependencies, and ship it all out as one package. The container market is exploding, especially within cloud services like Amazon Web Services
(AWS), Google Cloud Platform (GCP) and Microsoft Azure. The options are plentiful, and the decision is usually made by developers.
Some top container tools available in cloud service provider (CSP) environments include (in alphabetical order):
Some container security monitoring tools to consider include (in alphabetical order):
The container space continues to grow, and everyone wants a slice of the pie. We will see even more new technology disrupt the container market with the emergence of serverless, once stateful systems are supported or no longer needed.
The choices are plentiful, but these tools seem to be the most widely adopted and supported in the industry. Regardless of the public cloud provider your organization utilizes, this is a game of innovation, integration and scale.
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in
connection with such information, opinions, or advice.
December 2, 2021
By IANS Faculty
As the end of the year approaches, security leaders are starting to plan their strategic and tactical roadmaps for the year ahead. Here is a list of three security initiatives to consider in 2022.
November 30, 2021
The most valuable server and endpoint security metrics for security teams tend to help improve the security program overall. Here is a list of key server and endpoint security metrics to use for reporting.
November 23, 2021
Understand how data lakes differ from SIEMs, and guidance for planning, building, and securing a security data lake.