Avatar photo
By: Glen Kosaka

April 3, 2024 1:56 pm

3,518 views

How NeuVector Can Protect Against the XZ Backdoor Attack CVE-2024-3094 in Kubernetes Environments

Security researcher Andres Freund reported to Debian that the xz/liblzma library had been backdoored. As a result, CVE-2024-3094 was published with a critical CVSS score of 10. This vulnerability stems from a supply chain compromise on versions 5.6.0 and 5.6.1 of XZ Utils. XZ Utils is data compression software included in […]

Read More


Avatar photo
By: Glen Kosaka

March 15, 2024 7:13 pm

2,641 views

How NeuVector Leverages eBPF to Improve Observability and Security

Extended Berkeley Packet Filter There’s been a lot of recent interest in eBPF (extended Berkeley Packet Filter) and its application for container security solutions. Let’s examine eBPF's features and benefits and how NeuVector utilizes them to enhance its full-lifecycle container security solution. eBPF enables products to run sandboxed programs in a privileged context, […]

Read More


Avatar photo
By: Glen Kosaka

March 14, 2024 5:24 pm

1,798 views

NeuVector UI Extension for Rancher Enhances Secure Cloud Native Stack

We have officially released the first version of the NeuVector UI Extension for Rancher! This release is an exciting first step for integrating NeuVector security monitoring and enforcement into the Rancher Manager UI.  The security vision for SUSE and its enterprise container management (ECM) products has always been to enable easy deployment, monitoring and […]

Read More


Avatar photo
By: Glen Kosaka

January 30, 2024 7:21 pm

2,836 views

NeuVector Releases v 5.3.0: Enhancing Network Security and Automation

We are pleased to announce the release and general availability of NeuVector version 5.3.0! This release adds significant functionality to our market-leading container network security protections, as well as support for GitOps security as code automation. It also expands the breadth of platform compatibility with Arm64 and public cloud marketplace support.   […]

Read More


Avatar photo
By: Glen Kosaka

January 19, 2024 8:11 pm

3,243 views

Security Controls for the OWASP Kubernetes Top 10

Using NeuVector to Reduce Risk in Kubernetes Kubernetes has become the de-facto standard for container orchestration platforms and is widely used in business-critical infrastructure in enterprises of all sizes. With this popularity comes an increase in focus for hackers to exploit vulnerabilities and misconfigurations in Kubernetes clusters. The orchestration layer system resources, as well as […]

Read More


Avatar photo
By: Glen Kosaka

July 6, 2023 6:15 am

4,893 views

NeuVector by SUSE release 5.2 is now available!

I am pleased to announce the availability of version 5.2 of the NeuVector container security platform. This release packs a significant number of valuable enhancements and bug fixes for users requiring full-lifecycle security for their Kubernetes container pipeline and deployments.  Vulnerability scanning and admission controls are critical NeuVector features for ensuring supply chain […]

Read More


Avatar photo
By: Glen Kosaka

February 2, 2023 3:15 am

1,375 views

Microservices

Integrated, Automated Security for Containers Deployed with Kubernetes, Red Hat Openshift, IBM Cloud, Google Cloud, AWS and More   End-to-End Kubernetes Protection Transition to microservices securely. NeuVector offers end-to-end vulnerability management to establish your risk profile and the only patented container firewall for immediate protection from zero days, known, and unknown threats. Get integrated, […]

Read More


Avatar photo
By: Glen Kosaka

February 1, 2023 12:54 pm

3,410 views

Container Security: Zero Trust Runtime Security

Protect data in production   Traditional security practices focus on exceptions, blocklists, signatures, malware, and vulnerability scanning. These legacy approaches, while important to a layered security approach, focus efforts on being reactive which is becoming harder to scale. Zero-Trust is critical in moving to a proactive approach to security, where we can declare acceptable behavior […]

Read More


Avatar photo
By: Glen Kosaka

February 1, 2023 12:53 pm

3,531 views

Kubernetes Security: Vulnerability Management 

Profile Risk with Vulnerability Management Throughout the Build, Ship, and Run Pipeline NeuVector scans for vulnerabilities during the entire continuous integration/continuous delivery (CI/CD) pipeline, from Build to Ship to Run. Use the Jenkins plug-in to scan during build, monitor images in registries and run automated tests for security compliance. Prevent deployment of vulnerable images with […]

Read More