Tigera
  • Products
    • Calico Products
    • Calico Enterprise
    • Calico Essentials
    • Project Calico
    • Calico for Windows
  • Use Cases
    • Egress Access Controls
    • Observability and Troubleshooting
    • Enterprise Security Controls
    • Extend Firewalls to Kubernetes
    • Zero Trust Network Security
    • Intrusion Detection
    • Cloud Microsegmentation
    • Self Service Network Security Changes
    • Multi-Cluster Networking, Security, Observability
  • Resources
    • Resource Center
    • Free Online Training & Webinar
    • Get Calico Certified
    • Training
    • Newsroom
  • Blog
  • Contact Us
  • Try Now
Select Page
New Vulnerability Exposes Kubernetes to Man-in-the-Middle Attacks: How to Mitigate CVE-2020-8554

New Vulnerability Exposes Kubernetes to Man-in-the-Middle Attacks: How to Mitigate CVE-2020-8554

by Manoj Ahuje | Dec 22, 2020 | Blog, Calico Enterprise, Security, Threat Research

What is CVE-2020-8554? A few weeks ago a solution engineer discovered a critical flaw in Kubernetes architecture and design, and announced that a “security issue was discovered with Kubernetes affecting multi-tenant clusters. If a potential attacker can already create...
New Vulnerability Exposes Kubernetes to Man-in-the-Middle Attacks: How to Mitigate CVE-2020-8554

Kubernetes Q3-2020: Threats, Exploits and TTPs

by Manoj Ahuje | Sep 30, 2020 | Blog, Calico Enterprise, Cloud Security, Threat Research

Kubernetes has become the world’s most popular container orchestration system and is taking the enterprise ecosystem by storm. At this disruptive moment it’s useful to look back and review the security threats that have evolved in this dynamic landscape....
How to Efficiently Detect Domain Generation Algorithms (DGA) in Kubernetes with Calico Enterprise

How to Efficiently Detect Domain Generation Algorithms (DGA) in Kubernetes with Calico Enterprise

by Manoj Ahuje | Mar 17, 2020 | Anomaly Detection, Calico Enterprise, Cloud Security, Machine Learning, Threat Research

Introduction 2020 is predicted to be an exciting year with more organizations adopting Kubernetes than ever before. As critical workloads with sensitive data migrate to the cloud, we can expect to encounter various Advanced Persistent Threats (APT) targeting that...
Five Ways to Quickly Uncover Malicious Activity and Protect Your Kubernetes Workloads

Five Ways to Quickly Uncover Malicious Activity and Protect Your Kubernetes Workloads

by Manoj Ahuje | Dec 12, 2019 | Calico Enterprise, Cloud Security, Security

Organizations are rapidly moving more and more mission-critical applications to Kubernetes (K8s) and the cloud to reduce costs, achieve faster deployment times, and improve operational efficiencies, but are struggling to achieve a strong security posture because of...
  • Products

  • Calico Products
  • Calico Enterprise
  • Calico Essentials
  • Project Calico
  • Calico for Windows
  • Use Cases

  • Egress Access Controls
  • Observability and Troubleshooting
  • Enterprise Security Controls
  • Extend Firewalls to Kubernetes
  • Zero Trust Network Security
  • Intrusion Detection
  • Cloud Microsegmentation
  • Self Service Network Security Changes
  • Multi-Cluster Networking, Security, Observability
  • Resources

  • Resource Center
  • Free Online Training & Webinar
  • Get Calico Certified
  • Newsroom
  • Tigera Blog
  • Services

  • Support Portal
  • Training
  • Company

  • Partners
  • Careers
  • Leadership
  • Contact Us
Tigera: Extend Firewalls to Kubernetes

Copyright © Tigera, Inc. All rights reserved | Privacy Center | Do Not Sell My Information | Legal

X

NEW Free Calico Certification!Become a Kubernetes networking and network security expert.Learn more >>>