Codebreaking clouds: hacking cloud native environments through VAPT mastery
Member post originally published on SighUP’s blog by Simone Ragonesi Discover all you need to know about Cloud-Native Vulnerability Assessment and Penetration Testing (VAPT) with practical examples. Introduction This article embarks on a journey into the realm of Cloud-Native…
KubeAdmiral: next-generation multi-cluster orchestration engine based on Kubernetes
Member post originally published on the Bytedance blog by Gary Liu Project link: https://github.com/kubewharf/kubeadmiral Since its release in 2014, Kubernetes has become the de facto standard for cloud native orchestration and scheduling systems, delivering substantial value to infrastructure…
Top 5 tips for better Kubernetes self service
Member post originally published on Fairwinds’s blog by Robert Brennan, Director of Open Source Software at Fairwinds. When you’ve got a medium- to large-sized company, you need a platform to help your application teams ship code into production…
Securing attacks targeted at user or kernel level for customer X with KubeArmor & AWS Bottlerocket
Member post by AccuKnox Introduction: In the realm of cybersecurity, ensuring that virtualized or cloud-based infrastructures security is paramount. One crucial aspect is safeguarding applications where most of our crown-jewel sits and are susceptible to dynamic changes. In…
Cloud native technology continues to make an impact across industries and geographies SAN FRANCISCO, Calif. – October 18, 2023 – The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced today that 36…
Community post originally published on Medium by Mathieu Benoit In Kubernetes 1.25 as stable (and since 1.23 as beta), the Pod Security admission (PSA) controller replaces PodSecurityPolicy (PSP), making it easier to enforce predefined Pod Security Standards (PSS) by simply adding a label to…
Secure your Kubernetes environment with OPA and Gatekeeper
Guest post originally published on SighUP’s blog by Simone Ragonesi We will introduce you to the powerful combination of Open Policy Agent (OPA) and Gatekeeper for Kubernetes security. In this article, we will introduce you to the powerful combination…
Kubernetes security: best practices for Kubernetes secrets management
Guest post originally published on the CyberArk blog by John Walsh Kubernetes has come a long way since its inception. But as the adoption of containerization has grown, Kubernetes security continues to be top of mind. Red Hat’s “The State of…
Kubernetes governance & the top 5 best practices of K8s deployment
Member post originally published on the Fairwinds blog by Joe Pelletier The widespread adoption of containerized applications has fundamentally changed how organizations develop, deploy, and manage their software infrastructure. Kubernetes is fundamental to this change, because it makes…
Guest post originally published on Weaveworks’ blog Overview Developed by Weaveworks in 2016, Flux CD is a GitOps continuous delivery tool used to streamline and automate application deployments. It started as a small, internal project; now it’s a CNCF-graduated project with a…