Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Red Hat Open-Sourcing StackRox Security Technology

Red Hat this week announced that it’s taking the first steps towards open-sourcing the StackRox container security product for Kubernetes.

Red Hat this week announced that it’s taking the first steps towards open-sourcing the StackRox container security product for Kubernetes.

Announced only months after Red Hat bought StackRox, the new StackRox community project follows the organization’s business model of providing open source enterprise solutions.

The upstream project will “work to open source and manage the code that powers Red Hat Advanced Cluster Security for Kubernetes,” which offers Kubernetes-native security for all those using Red Hat OpenShift, and to various public cloud Kubernetes services.

Open-sourcing StackRox is expected to provide a wider set of choices to users looking to keep Kubernetes environments protected, and should also drive further product developments.

“Once up and running, the StackRox project will enable users to address major security use cases across the application lifecycle, including visibility, vulnerability management, configuration management, network segmentation, compliance, threat detection and incident response, as well as risk profiling,” Red Hat says.

Furthermore, Red Hat says it will contribute to open source projects that StackRox software takes advantage of and actively engage with those communities.

The StackRox community will also encompass static analysis tool KubeLinter, which was open-sourced in October 2020 and which helps identify misconfigurations, as well as enforce security best practices.

Related: Cisco Acquires Kubernetes-Native Security Platform Portshift

Advertisement. Scroll to continue reading.

Related: VMware to Acquire Kubernetes Security Firm Octarine

Related: Google Adds GKE Open-Source Dependencies to Vulnerability Rewards Program

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.