Tigera
  • Products
    • Calico Products
    • Calico Enterprise
    • Calico Essentials
    • Project Calico
    • Calico for Windows
  • Use Cases
    • Egress Access Controls
    • Observability and Troubleshooting
    • Enterprise Security Controls
    • Extend Firewalls to Kubernetes
    • Zero Trust Network Security
    • Intrusion Detection
    • Cloud Microsegmentation
    • Self Service Network Security Changes
    • Multi-Cluster Networking, Security, Observability
  • Resources
    • Resource Center
    • Free Online Training & Webinar
    • Get Calico Certified
    • Training
    • Newsroom
  • Blog
  • Contact Us
  • Try Now
Select Page
Kubernetes Q3-2020: Threats, Exploits and TTPs

Kubernetes Q3-2020: Threats, Exploits and TTPs

by Manoj Ahuje | Sep 30, 2020 | Blog, Calico Enterprise, Cloud Security, Threat Research

Kubernetes has become the world’s most popular container orchestration system and is taking the enterprise ecosystem by storm. At this disruptive moment it’s useful to look back and review the security threats that have evolved in this dynamic landscape....
Now GA: Data-in-Transit Encryption in Calico v3.15

Now GA: Data-in-Transit Encryption in Calico v3.15

by John Armstrong | Jul 9, 2020 | Blog, Calico, Cloud Security, Kubernetes

We’re excited to announce that the latest release of Calico includes encryption for data-in-transit. Calico is the open source networking and network security solution for containers, virtual machines, and host-based workloads, offering connectivity and security for...
How to Efficiently Detect Domain Generation Algorithms (DGA) in Kubernetes with Calico Enterprise

How to Efficiently Detect Domain Generation Algorithms (DGA) in Kubernetes with Calico Enterprise

by Manoj Ahuje | Mar 17, 2020 | Anomaly Detection, Calico Enterprise, Cloud Security, Machine Learning, Threat Research

Introduction 2020 is predicted to be an exciting year with more organizations adopting Kubernetes than ever before. As critical workloads with sensitive data migrate to the cloud, we can expect to encounter various Advanced Persistent Threats (APT) targeting that...
Five Ways to Quickly Uncover Malicious Activity and Protect Your Kubernetes Workloads

Five Ways to Quickly Uncover Malicious Activity and Protect Your Kubernetes Workloads

by Manoj Ahuje | Dec 12, 2019 | Calico Enterprise, Cloud Security, Security

Organizations are rapidly moving more and more mission-critical applications to Kubernetes (K8s) and the cloud to reduce costs, achieve faster deployment times, and improve operational efficiencies, but are struggling to achieve a strong security posture because of...
A Multi-part Microservice Primer for Infosec Professionals (Part 4)

A Multi-part Microservice Primer for Infosec Professionals (Part 4)

by Christopher Liljenstolpe | Jul 13, 2018 | Cloud Security, Compliance, Containers, Cybersecurity, Microservices

This is the fourth (and final) part of a four-part series discussing the microservice revolution, and how it impacts the InfoSec community. This series is a not meant to be a definitive guide, but more of an overview that initiates your Microservice journey. The first...
A multi-part Microservice Primer for Infosec Professionals (part 3)

A multi-part Microservice Primer for Infosec Professionals (part 3)

by Christopher Liljenstolpe | Jun 4, 2018 | Cloud Security, Compliance, Cybersecurity, Microservices, Security

This is the third part of a four-part series discussing the microservice revolution, and how it impacts the InfoSec community. This is not meant to be a definitive guide, but more of an overview that will start you on your own Microservice journey. The first two parts...
« Older Entries
  • Products

  • Calico Products
  • Calico Enterprise
  • Calico Essentials
  • Project Calico
  • Calico for Windows
  • Use Cases

  • Egress Access Controls
  • Observability and Troubleshooting
  • Enterprise Security Controls
  • Extend Firewalls to Kubernetes
  • Zero Trust Network Security
  • Intrusion Detection
  • Cloud Microsegmentation
  • Self Service Network Security Changes
  • Multi-Cluster Networking, Security, Observability
  • Resources

  • Resource Center
  • Free Online Training & Webinar
  • Get Calico Certified
  • Newsroom
  • Tigera Blog
  • Services

  • Support Portal
  • Training
  • Company

  • Partners
  • Careers
  • Leadership
  • Contact Us
Tigera: Extend Firewalls to Kubernetes

Copyright © Tigera, Inc. All rights reserved | Privacy Center | Do Not Sell My Information | Legal

X

NEW Free Calico Certification!Become a Kubernetes networking and network security expert.Learn more >>>