Three Ways Towards Threat-Focused Container Security with CYR3CON
1. Identify threats to container infrastructure


CYR3CON’s threat-intelligence driven CyRating® for Docker vulnerability CVE-2019-14271 and Kubernetes vulnerability CVE-2019-11245 as they change over time.
Know when there is a viable threat to Kubernetes or Docker infrastructure that drives upgrade or mitigation.


2. Find ignored threats in your instances


Integrate with vulnerability scanners like Qualys and Clair to pinpoint the vulnerabilities in your images for which hackers are currently developing attacks.
Russian and Chinese posts on a Linux kernel vulnerability receiving a medium rating by NIST CVSS. The vulnerability is exploited in the wild - exploit code is widely available.



3. Integrate Intelligence


Integrate intelligence into your CICD workflow to identify and prevent the deployment of containers that contain vulnerabilities hackers are targeting.
CYR3CON’s Python SDK, GitHub plug-in, and REST-based API enable integration into most workflows. This prevents the deployment of threatened containers based on real-time intelligence from the hacker communities.

© 2020 Cyber Reconnaissance, Inc.
The technology represented by CyRating consists of multiple pending and issued patents in the US, EU, and other countries. Scientific papers shown here are associated with one or more inventions either owned or exclusively licensed to Cyber Reconnaissnace, Inc. CYR3CON and CyRating are registered trademarks of Cyber Reconnaissance, Inc.