Defend Zero Day Attacks

Garner holistic visibility across development and deployment life cycle. Mitigate risks proactively to foil attacks with our most advanced and sophisticated CNAPP product.

Open Source

AccuKnox is the first 5G Security-ORAN to be published on Nephio

From fortifying the control plane to addressing vulnerabilities in the data plane, read the white paper and discover the crucial steps we need to take in order to enhance the security of 5G networks.

Cloud Native Security Redefined

Accelerate your cloud journey with our battle-tested expertise, delivering a comprehensive zero trust framework that safeguards cloud infrastructure and applications from targeted attacks.

Open Source

KubeArmor is now certified Redhat Openshift Operator

Embracing the Power of Open Source: We are proud to contribute to the open-source community, allowing businesses to leverage the strength of KubeArmor to safeguard their containerized environments.

Fulfill Cloud Security GRC Requirements with AccuKnox

Fulfill Cloud Security GRC Requirements with AccuKnox

In the complex landscape of cloud security, adhering to governance, risk, and compliance (GRC) requirements is paramount. AccuKnox CNAPP stands as a comprehensive solution that addresses GRC challenges head-on. This blog dissects the tools and features that our CNAPP platform includes that are needed to navigate compliance complexities.

Fulfill Cloud Security GRC Requirements with AccuKnox

In the complex landscape of cloud security, adhering to governance, risk, and compliance (GRC) requirements is paramount. AccuKnox CNAPP stands as a comprehensive solution that addresses GRC challenges head-on. This blog dissects the tools and features that our CNAPP platform includes that are needed to navigate compliance complexities.

read more
“NginxDay 2022”: NGINX LDAP Zero-Day Vulnerability

“NginxDay 2022”: NGINX LDAP Zero-Day Vulnerability

Introduction A significant error with the Nginx-LDAP-auth software package was recently disclosed publicly, allowing attackers to avoid authenticity and disclose important information to the affected servers. This risk is still under investigation, so this blog post...

read more
KubeArmor Host enforcement + Policy discovery

KubeArmor Host enforcement + Policy discovery

KubeArmor now adds support for host policies i.e policies that can directly run on Virtual Machines and Baremetal systems using AppArmor and SELinux. A host policy is a policy that is applicable to a given host (identified by a label) and can be enforced on the host...

read more
KubeArmor adds support for SELinux

KubeArmor adds support for SELinux

KubeArmor now supports SELinux based enforcement for host policies, This allows enforcement on virtual machines or bare metal instances with Red Hat Enterprise Linux and CentOS. Security-Enhanced Linux (SELinux) is a mandatory access control (MAC) security mechanism...

read more
Runtime protection of NodeJS applications using AccuKnox

Runtime protection of NodeJS applications using AccuKnox

Introduction The rise in popularity of JavaScript has resulted in many changes, and the face of web development today is very different. In this article, we will be learning how to protect NodeJS applications at runtime using Accuknox’s open-source tooling. Accuknox...

read more
KubeArmor version release v0.3

KubeArmor version release v0.3

Default Security Posture One of the tenets of achieving Zero Trust stature requires one to set the workloads in "least-permissive mode". Setting up least-permissive mode can be fraught with challenges and it is important that the tooling supports gradual upgrade to...

read more
An Introduction to Linux Security Modules (LSMs)

An Introduction to Linux Security Modules (LSMs)

Introduction The Linux security module (LSM) framework, which allows for security extensions to be plugged into the kernel, has been used to implement MAC on Linux. LSM hooks in Linux Kernel mediates access to internal kernel objects such as inodes, tasks, files,...

read more
Kubernetes Hardening guide by NSA and CISA

Kubernetes Hardening guide by NSA and CISA

NSA and CISA recently published the Kubernetes hardening guide which contains valueble suggestions to harden a Kubernetes Cluster. The file has been directly embedded for ease of reading. Alternatively, users can download the file directly from this link:  

read more