DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Core Badge
Avatar

Akanksha Pathak

DZone Core CORE

Senior Cybersecurity Consultant at Visa Inc

San Francisco, US

Joined Feb 2023

https://pathakakanksha991.wixsite.com/cybersecurity

About

Akanksha Pathak is a Cybersecurity Consultant specializing in Cloud Security, Application Security, Threat Analysis & Response, Vulnerability Management, and Product Security. As a senior member of the corporate governance team, she oversees the third-party cybersecurity practice. Her expertise lies in managing supplier relationships while also architecting and analyzing application designs. Additionally, she is an active participant in many cybersecurity communities, such as the LASCON. She also run a podcast 'Learn as I learn' for technology and cybersecurity enthusiasts. Working in a challenging environment has helped her to gain a critical thinking approach with an entrepreneurial mindset, keeping IT security a crucial criterion.

Stats

Reputation: 1419
Pageviews: 67.8K
Articles: 13
Comments: 1
  • Articles
  • Trend Reports
  • Events
  • Comments

Articles

article thumbnail
Endpoint Security Controls: Designing a Secure Endpoint Architecture, Part 2
This outlines a layered approach to endpoint security, covering Zero Trust, Secure by Default, device approval, hardening, patching, malware protection, and encryption.
May 16, 2025
· 2,588 Views · 1 Like
article thumbnail
Endpoint Security Controls: Designing a Secure Endpoint Architecture, Part 1
This outlines a layered approach to endpoint security, covering Zero Trust, Secure by Default, device approval, hardening, patching, malware protection, and encryption.
May 15, 2025
· 3,190 Views · 2 Likes
article thumbnail
Security in the Age of AI: Challenges and Best Practices
Key security challenges in AI and strategies to protect systems, from data breaches to adversarial attacks, to ensure robust and secure AI integration.
January 13, 2025
· 3,085 Views · 3 Likes
article thumbnail
Guide to Securing Your Software Supply Chain: Exploring SBOM and DevSecOps Concepts for Enhanced Application Security
Through continuous improvement of SBOMs and DevSecOps practices using open-source tools, organizations can enhance their app security and mitigate risks.
September 1, 2024
· 8,977 Views · 4 Likes
article thumbnail
How To Protect a File Server
To secure a Linux file server, apply a Defense in Depth approach. Always remember that security is a continuous process, not a one-time task.
May 24, 2024
· 2,237 Views · 3 Likes
article thumbnail
Building Resilient Cybersecurity Into Supply Chain Operations: A Technical Approach
Adding cybersecurity measures into each facet of the supply chain safeguards operations and sensitive data, giving a competitive edge in the digital marketplace.
April 3, 2024
· 3,381 Views · 3 Likes
article thumbnail
Modern DevSecOps: Benefits, Challenges, and Integrations To Achieve DevSecOps Excellence
In this article, explore the benefits, challenges, and integrations that are a part of achieving DevSecOps excellence.
December 15, 2023
· 6,279 Views · 4 Likes
article thumbnail
Secure the Cluster: A Blazing Kubernetes Developer’s Guide to Security
This article will serve as a comprehensive guide to Kubernetes security, aimed at helping developers protect their applications and data.
October 24, 2023
· 6,261 Views · 4 Likes
article thumbnail
Risk Assessment Using Blockchain
To understand how blockchain can help in this area, it is important to understand the technicalities behind this technology.
July 3, 2023
· 5,450 Views · 2 Likes
article thumbnail
A Practical Guide for Container Security: Trends and Strategies for 2023
Explore container security's fundamental principles and strategies, learn 2 specific methods, and examine tools and techniques for securing keys, tokens, and passwords.
June 9, 2023
· 10,539 Views · 5 Likes
article thumbnail
Container Security: Don't Let Your Guard Down
To comprehend the security implications of a containerized environment, it is crucial to understand the fundamental elements of a container deployment network.
March 16, 2023
· 7,497 Views · 4 Likes
article thumbnail
Guarding Against Threats: Examining the Strengths and Applications of Modern Security Models
It is crucial to know the different security models, their features, and their suitability for specific situations.
March 13, 2023
· 3,839 Views · 2 Likes
article thumbnail
Security Architecture Review on a SASE Solution
Recent trends suggest that organizations are now moving to SASE solutions, replacing existing vendors that provide services like CASB, DLP, proxy solutions, etc.
February 28, 2023
· 4,473 Views · 2 Likes

Trend Reports

Trend Report

Enterprise Security

Security is everywhere: Behind every highly performant application, or even detected threat, there is a powerful security system and set of processes implemented. And in the off chance there are NOT such systems in place, that fact will quickly make itself known. We are living in an entirely new world, where bad actors are growing more and more sophisticated the moment we make ourselves "comfortable." So how do you remain hypervigilant in this ever so treacherous environment?DZone's annual Enterprise Security Trend Report has you covered. The research and expert articles explore the fastest emerging techniques and nuances in the security space, diving into key topics like CSPM, full-stack security practices and challenges, SBOMs and DevSecOps for secure software supply chains, threat hunting, secrets management, zero-trust security, and more. It's time to expand your organization's tactics and put any future attackers in their place as you hear from industry leaders and experts on how they are facing these challenges in everyday scenarios — because if there is one thing we know about the cyberspace, any vulnerabilities left to chance will always be exposed.

Enterprise Security

Trend Report

Enterprise Security

This year has observed a rise in the sophistication and nuance of approaches to security that far surpass the years prior, with software supply chains being at the top of that list. Each year, DZone investigates the state of application security, and our global developer community is seeing both more automation and solutions for data protection and threat detection as well as a more common security-forward mindset that seeks to understand the Why.In our 2023 Enterprise Security Trend Report, we dive deeper into the greatest advantages and threats to application security today, including the role of software supply chains, infrastructure security, threat detection, automation and AI, and DevSecOps. Featured in this report are insights from our original research and related articles written by members of the DZone Community — read on to learn more!

Enterprise Security

Trend Report

Kubernetes in the Enterprise

Kubernetes: it’s everywhere. To fully capture or articulate the prevalence and far-reaching impacts of this monumental platform is no small task — from its initial aims to manage and orchestrate containers to the more nuanced techniques to scale deployments, leverage data and AI/ML capabilities, and manage observability and performance — it’s no wonder we, DZone, research and cover the Kubernetes ecosystem at great lengths each year.In our 2023 Kubernetes in the Enterprise Trend Report, we further dive into Kubernetes over the last year, its core usages as well as emerging trends (and challenges), and what these all mean for our developer and tech community. Featured in this report are actionable observations from our original research, expert content written by members of the DZone Community, and other helpful resources to help you go forth in your organizations, projects, and repos with deeper knowledge of and skills for using Kubernetes.

Kubernetes in the Enterprise

Trend Report

Containers

The proliferation of containers in recent years has increased the speed, portability, and scalability of software infrastructure and deployments across all kinds of application architectures and cloud-native environments. Now, with more and more organizations migrated to the cloud, what's next? The subsequent need to efficiently manage and monitor containerized environments remains a crucial task for teams. With organizations looking to better leverage their containers — and some still working to migrate out of their own monolithic environments — the path to containerization and architectural modernization remains a perpetual climb. In DZone's 2023 Containers Trend Report, we will explore the current state of containers, key trends and advancements in global containerization strategies, and constructive content for modernizing your software architecture. This will be examined through DZone-led research, expert community articles, and other helpful resources for designing and building containerized applications.

Containers

Events

Watch

On Demand Event Thumbnail

Enterprise Security Reinforcing Enterprise Application Defense

Presenter: Censys

Watch

On Demand Event Thumbnail

Kubernetes in the Enterprise: Redefining the Container Ecosystem

Presenter: DZone in partnership with Platform 9

Watch

On Demand Event Thumbnail

Containers: Moderization and Advancements in Cloud-Native Development

Presenter: D2iQ

Comments

Container Security: Don't Let Your Guard Down

Mar 26, 2023 · Akanksha Pathak

Thank you for your feedback, John. However, please note that this article is not intended to cover the security aspects of a specific Kubernetes version. It is about container security in general and which steps can organizations take to reduce exposure.

As mentioned, Kubernetes is only meant to serve as an example to help readers understand the basic components and high level architecture of a container orchestration platform. Please note, while I agree that in later versions, master label is no more used and the term "master" has been deprecated in Kubernetes following version 1.20, using "control plane" instead, it was mainly to promote more inclusive language in the Kubernetes community. However, it is important to note that while the term "master" has been deprecated in Kubernetes, it is used in legacy systems, documentation, or discussions. The attempt is to make terminologies clear for everyone. For detailed information on Kubernetes cluster, a link is provided in the article.

For virtual switches, while K8 often uses the term CNIs, which provide a virtual network interface for each container, OpenShift uses "virtual switches" to refer to the virtual network interfaces used by containers. Additionally, Docker Swarm uses a built-in virtual switch called the "overlay network" to provide networking between containers running on different hosts and Microsoft Azure Container Service uses a virtual switch to provide networking between containers running on different hosts.

I would challenge the statement, "VPN on host OS is not a thing". Installing a VPN on the host operating system with right configuration and management can provide an additional layer of security for containers running on that host.

While PSA (Platform Security Architecture) policies are guidelines for building secure devices, they are not a substitute for security assessment. Security assessment is the process of evaluating the security of a device or application, typically using a combination of automated tools and manual testing. Security assessment can help identify vulnerabilities and weaknesses that may not be covered by PSA policies, and can provide a more comprehensive evaluation of security.

Finally, the article is written for organizations deploying containers in general and not specific to any particular version of Kubernetes. While K8 is one of the container orchestration platform, there are many others in the market like Docker Swarm, EKS, AKS, OpenShift, etc. Remember that the article mainly focuses on security and not container implementation process.

User has been successfully modified

Failed to modify user

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: