Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Ask The Experts

03:00 PM
Edge Editors
Edge Editors
Ask the Experts

How Do I Get My Team Started with Container Security and Kubernetes?

The trick is to give your technical staff enough time to learn the new technology but also keep the pressure on to deliver. Here's a smart way to begin.

Question: Container security and Kubernetes are buzzing right now. What's a common-sense approach to getting started?

Michelle McLean, vice president of marketing at StackRox: Businesses are hearing a lot about containers and Kubernetes these days and for good reason: Developing in this stack can accelerate the digital transformation goals companies have set for themselves. If you can build apps faster, you can iterate and improve on the experience your customers have with your brand.

The challenge is that everyone is on a learning curve when it comes to using these technologies. Business leaders need to understand the business advantages, and technical leaders need to invest in educating their staff.

To get folks on the learning curve, businesses need to pick a small but important application either existing or about to be developed and make the investment to build or refactor this application using containers and microservices. Doing is the best way to learn, and technical staff will appreciate the opportunity to learn next-gen technology.

The business needs to give that technical staff coming up to speed enough time to learn the new technology but also keep the pressure on to deliver. The industry has created plenty of best practices guides, and companies can adopt services like managed Kubernetes offerings from cloud providers to lower the barrier to entry. Most importantly, companies need to make the investment in learning how to secure this new technology stack. Moving fast but without proper security controls will undo any business advantage in adopting the new technology.

Related Content:

State of the Cloud
5 Disruptive Trends Transforming Cybersecurity
6 Serverless and Containerization Trends CISOs Should Track

The Edge is Dark Reading's home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Building Cybersecurity Strategies in Sub-Saharan Africa

Filmed for Dark Reading News Desk at Black Hat Virtual.

LAURA TICH: We have that imbalance, where the big organizations are more protected, where the smaller ones -- which are the most common businesses in the region -- they are least protected... Sometimes they do get the tools, they do get the funding to buy some critical tools, but there's a lack of skills to handle or people who understand how to work those tools. So there are a lot of factors that contribute to our growth -- or lack thereof -- in the cybersecurity industry.


Name That Toon: 'Rise' and Shine
Flash Poll