Twistlock

twistlock

How to Lock Down the Kernel to Secure the Container Host

Container security is obviously a multi-layered affair. Also, many of the layers you need to secure and monitor exist outside containers themselves.The end result is the whole stack is secured, including registries and orchestrators. One critical layer consists of the host operating system and the kernel that powers it. In this article, I take a look at how to secure the container host, with a focus on kernel-level security.

twistlock

One Chapter Ends, Another Begins

Today, Twistlock officially becomes part of Palo Alto Networks. This is the end of an amazing chapter in many of our lives, one that would never have been possible without the support and trust of you, our customers. From the very beginning, we knew we wanted to not just build a better enterprise security product but to be a better, genuine partner to our customers.

twistlock

The Greatest Security Risks Lurking in Your CI/CD Pipeline

Your CI/CD pipeline helps you achieve fast and efficient application delivery — but it does not necessarily keep your applications secure. While CI/CD offers many advantages, the speed and lack of manual oversight associated with CI/CD processes can also create new security risks. Those risks can be managed, but only if you place security front and center within your CI/CD pipeline. Below, I explain common security oversights in CI/CD chains, and how to address them.

twistlock

Enhanced Security Capabilities for Windows Hosts and Containers

This technical deep dive highlights key capabilities released as part of Twistlock 19.07. To learn more about what’s included with Twistlock 19.07, check out our full release blog post. In a previous blog post, we demonstrated Twistlock security capabilities for Windows containers and hosts. The last year has continued exponential growth in the adoption of Microsoft Azure and microservices.

twistlock

Microsegmentation for Containers and Cloud Native Applications with Twistlock

This technical deep dive highlights key capabilities released as part of Twistlock 19.07. To learn more about what’s included with Twistlock 19.07, check out our full release blog post. Twistlock’s Cloud Native Network Firewall (CNNF) already provides a solution to segmenting traffic between containers by learning expected container-to-container traffic.

twistlock

Cloud Native Forensics Featuring our Timeline View

Last August, Twistlock released the first cloud-native forensics platform aimed at delivering forensic information about your containers to help your security and incident response teams understand the activity taking place in your environment. Then, in version 19.03, we expanded this feature set to include host level forensic information to give even more forensic coverage across your workloads. This primarily covered process-related information on your containers and hosts.

twistlock

Twistlock 19.07 Release Notes

The usual fun facts from GitHub: Twistlock 19.07 is the 17th time we’ve shipped a major release, we’ve worked on 15,300 issues, pushed 7,400 commits, built Twistlock more than 1,200 times, and shipped over 390 customer requested features to 400 customers over more than 4 years! Twistlock protects most of the Fortune 10, more than 35% of the Fortune 100, and most Cabinet level agencies in the US Government, including all Department of Defense branches.

twistlock

A Security Primer for System Architects

System architects (which means IT professionals who design platforms and infrastructures) have lots of things to think about when they do their work. Performance and availability are essential considerations. So are legacy compatibility, future-proofing, and scalability. Security wasn’t always high on the list of priorities for system architects. Traditionally, security was someone else’s job. But that has changed.