Logz.io announced the addition of critical security scanning to its Kubernetes 360 unified observability interface.
Integrating key security and compliance context into Kubernetes 360 directly enables today’s monitoring and observability teams to quickly identify critical vulnerabilities present in their applications and infrastructure to inform related remediation.
Based on a integration with the Aqua Trivy open source vulnerability and misconfiguration scanning solution, the advancement empowers Logz.io Open 360™ platform users to quickly identify and resolve security issues introduced to their Kubernetes environments. Trivy specifically scans for problematic open source software packages and dependencies, infrastructure as code issues and misconfigurations, and Common Vulnerabilities and Exposures.
Introduced in late 2022, Logz.io’s Kubernetes 360 is purpose-built to unify all the observability data needed by today’s teams tasked with ensuring optimization of complex, fast moving Kuberenetes systems.
“Kubernetes has become the de facto operating system for applications-driven organizations, and this is driving the rapid convergence of security and observability data,” said Asaf Yigal, CTO and co-founder of Logz.io. “As a result, organizations need baked-in security monitoring and response for Kubernetes environments, and with this added content, Kubernetes 360 further provides everything teams need to monitor their environments in a single interface.”
Injecting critical security and compliance details into Kubernetes 360 represents the next step in Logz.io’s strategy of enabling Open 360 with the simple, unified and cost effective capabilities that today’s fast growth software organizations need to optimize their observability practices and budgets. Whether acting quickly to remediate vulnerabilities and configurations themselves, or in partnership with full-time security teams, adding security and compliance content to Kubernetes 360 will further accelerate customers’ DevOps and CI/CD practices through a single source of analysis and visualization.
The addition of Aqua Trivy monitoring intelligence into Kubernetes 360 also represents Logz.io’s continued work to leverage a broad range of expanded integrations to enable a more capable solution.
In addition to detailed security content for Kubernetes 360 users, the Open 360 platform includes the Logz.io Cloud SIEM, providing advanced threat detection and response for dedicated security analyst teams and DevSecOps practitioners. Used in combination, the platform now provides far reaching capabilities for integrated security investigation and response – spanning from software engineering through the SOC, and beyond.
The Latest
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...
In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...
In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...
In today's fast-paced and increasingly complex network environments, Network Operations Centers (NOCs) are the backbone of ensuring continuous uptime, smooth service delivery, and rapid issue resolution. However, the challenges faced by NOC teams are only growing. In a recent study, 78% state network complexity has grown significantly over the last few years while 84% regularly learn about network issues from users. It is imperative we adopt a new approach to managing today's network experiences ...
