This is the ultimate security key for professionals.
This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years.
Kubernetes is a new type of software that's usually deployed on cloud server infrastructure. It's used for managing large IT networks and for quickly deploying app containers across multiple servers. If ever left exposed online, such systems usually expose the keys to the kingdom, allowing attackers to access existing server containers or deploy new ones with specific tasks in mind.
The most prominent companies that suffered a breach because of an exposed Kubernetes instance include Tesla Motors and Weight Watchers.
Albeit there are over 20,000 Kubernetes systems currently available online, most are properly secured, and there have been very few leaks that originated from Kubernetes until now.
But give it time! The technology is still new, and no doubt there will be many snafus in the coming months and years. If Kubernetes admins are looking into securing such systems, this page is the first place to go.
Caption by: Catalin Cimpanu
Join Discussion