Aviatrix Blog

Post Tag: cloud security

Recent

Computer screen with red lighting

Slaying Medusa Ransomware: How Cloud Security Can Stop This Rising Threat

Medusa Ransomware-as-a-Service exploits security gaps like unrestricted egress traffic. Learn how to protect your network through robust security practices.

Read More >
generic thumbnail

Google to Pay $32 Billion for Wiz

Wiz’s cloud-native capabilities are also advantageous to Google. “Google’s investment in Wiz (and decision to have it continue to operate independently) reflects a commitment to providing enhanced security solutions that

Read More >
Photo of a locked door

The Egress Security Gap: How Silk Typhoon and Other Threats Exploit Your Network’s Backdoor

Egress security is critical. Here's how to protect your network from APTs like Silk Typhoon as well as CSP changes.

Read More >
Kubernetes was Designed for Agility Not Enterprise Security

Kubernetes Networking Is Designed for Agility and Scale, Not Enterprise Security

Kubernetes enables mass deployment, automation, and scaling, but leaves security gaps. Learn how the Aviatrix Kubernetes Firewall provides comprehensive and cloud-native protection.

Read More >
Stock photo of a team collaborating

Empowering Networking Teams to Collaborate: The Aviatrix Kubernetes Firewall

The policy-driven security of the Aviatrix Kubernetes Firewall offers customization that help DevOps, platform engineers, and security teams work together.

Read More >
Image of Kubernetes clusters

Simplifying Kubernetes Networking with Aviatrix: Bridging Enterprise Infrastructure Gaps

The Aviatrix Kubernetes Firewall empowers organizations to overcome challenges like IP exhaustion and overlap, CNI integration, and security enforcement.

Read More >
Graphic with text: Cloud Computing Insider: David Linthicum and Anirban Sengupta on the new Aviatrix Kubernetes Firewall

“Two Ships Passing in the Night”: Bridging the Gap Between Kubernetes Networking and Security

Cloud expert David Linthicum and Aviatrix's Anirban Sengupta discuss the Aviatrix Kubernetes Firewall and how it empowers teams to secure and scale clusters.

Read More >
Futuriom: Future of Cloud Tech logo

Resource Radar: Futuriom – Accessible Cloud, Security, and Networking Analysis

Do you want industry analyst-level insights, without sifting through dry analyst reports? Since 2017, the folks at Futuriom have been keeping their finger on the pulse of cloud tech, cybersecurity,

Read More >
Aviatrix Kubernetes Firewall

Introducing the Kubernetes Firewall Architecture: Unlocking Network Security and Scalability

The Aviatrix Kubernetes Firewall uses a policy-driven approach to implement Zero Trust security, scalability, agility, observability, and automation.

Read More >
Spider on a keyboard. Salt Typhoon’s GhostSPIDER Malware Exposes Critical Network Vulnerabilities

Salt Typhoon’s GhostSPIDER Malware Exposes Critical Network Vulnerabilities

GhostSPIDER targets edge infrastructure and network devices that bridge on-premises data centers with public cloud environments.

Read More >