Kubestronaut in Orbit: Eyal Zekaria
Get to know Eyal This week’s Kubestronaut in Orbit, Eyal Zekaria is a Senior Cloud Architect in Berlin, Germany. Eyal has a DevOps and SRE background and has experience operating Kubernetes clusters at scale at different…
Emerging trends in the cloud native ecosystem
Member post by Jatinder Singh Purba, Principal, Infosys; Krishnakumar V, Principal, Infosys; Prabhat Kumar, Senior Industry Principal, Infosys; and Shreshta Shyamsundar, Distinguished Technologist, Infosys Emerging Trends in the Cloud-native Ecosystem In the last quarter of 2024,…
Kubestronaut in Orbit: Rishabh Sharma
Get to know Rishabh This week’s Kubestronaut in Orbit, Rishabh Sharma, our first Kubestonaut from Finland, is a senior software development engineer where he manages cloud native tech solutions for Capgemini Finland Oy. He is currently…
Software supply chain compliance and security policies with SignServer, EJBCA, and Chainloop
Member post originally published on the EJBCA by Keyfactor and Chainloop blogs by Ben Dewberry, Product Manager, Signing and Key Management, Keyfactor and Miguel Martinez Trivino, Co-founder, Chainloop A software supply chain is the series of steps…
How to ace (KCNA) Kubernetes and Cloud Native Associate exam
Community post originally published on Medium by Giorgi Keratishvili Introduction Most probably if you have been working in IT over last decate you would heared such words as containers, docker, cloud native, maybe even kubernetes, but wonder what does all those buzz words mean…
Top four Kubernetes attack chains and how to break them
Member post originally published on ARMO’s blog by Oshrat Nir, Developer Advocate at ARMO While Kubernetes adoption continues to soar, it has become a prime target for cyberattacks. Unfortunately, Kubernetes clusters are complex and can be difficult…
Secure your Kubernetes environment with OPA and Gatekeeper
Guest post originally published on SighUP’s blog by Simone Ragonesi We will introduce you to the powerful combination of Open Policy Agent (OPA) and Gatekeeper for Kubernetes security. In this article, we will introduce you to…
The five laws of cloud native authorization
Guest post originally published on Aserto’s blog by Omri Gazitt Overview In a microservices world, each service needs to verify that a subject (user or machine) has permission to perform an operation on a resource that…
Congratulations to 24 CNCF fall term LFX Program mentees!
We are excited to announce that 24 CNCF interns have successfully completed this term’s LFX Program! 24 of CNCF’s Graduated, Incubating, and Sandbox projects joined this round with projects including Meshery, WasmEdge, Kyverno, and Vitess. Additional…
Kubernetes governance explained
Guest post originally published on the Coredge blog Introduction According to IDC (IDC: Expect 175 zettabytes of data worldwide by 2025 ), it is projected that by 2025 our global data volume will reach 175 zetabytes. As…