Cybersecurity In-Depth: Getting answers to questions about IT security threats and best practices from trusted cybersecurity professionals and industry experts.

How Do I Get My Team Started with Container Security and Kubernetes?

The trick is to give your technical staff enough time to learn the new technology but also keep the pressure on to deliver. Here's a smart way to begin.

Edge Editors, Dark Reading

January 28, 2020

1 Min Read
Image: <a href=""target="_new">intararit</a> via Adobe Stock

Question: Container security and Kubernetes are buzzing right now. What's a common-sense approach to getting started?

Michelle McLean, vice president of marketing at StackRox: Businesses are hearing a lot about containers and Kubernetes these days and for good reason: Developing in this stack can accelerate the digital transformation goals companies have set for themselves. If you can build apps faster, you can iterate and improve on the experience your customers have with your brand.

The challenge is that everyone is on a learning curve when it comes to using these technologies. Business leaders need to understand the business advantages, and technical leaders need to invest in educating their staff.

To get folks on the learning curve, businesses need to pick a small but important application – either existing or about to be developed – and make the investment to build or refactor this application using containers and microservices. Doing is the best way to learn, and technical staff will appreciate the opportunity to learn next-gen technology.

The business needs to give that technical staff coming up to speed enough time to learn the new technology but also keep the pressure on to deliver. The industry has created plenty of best practices guides, and companies can adopt services like managed Kubernetes offerings from cloud providers to lower the barrier to entry. Most importantly, companies need to make the investment in learning how to secure this new technology stack. Moving fast but without proper security controls will undo any business advantage in adopting the new technology.

Related Content:

State of the Cloud
5 Disruptive Trends Transforming Cybersecurity
6 Serverless and Containerization Trends CISOs Should Track

About the Author(s)

Edge Editors

Dark Reading

The Edge is Dark Reading's home for features, threat data and in-depth perspectives on cybersecurity.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights