Search results for: security audit


Falcoctl: Artifact Management for Falco

Posted on March 10, 2025 | Nigel Douglas

Artifact management is the process of storing, organising, and securing the essential components generated throughout software development. Cloudsmith defines artifacts as the tangible outputs of the development lifecycle, including compiled source code, libraries, executables, and configuration…


Why Infrastructure as Code Needs to be Secure by Default

Posted on March 7, 2025

Infrastructure as Code (IaC) has become the standard for managing cloud infrastructure, but it introduces significant challenges, particularly around security and compliance. Issues such as misconfigurations, secret management, policy enforcement, and auditing can complicate workflows. These…


AI Cloud: What, Why, and How?

Posted on March 6, 2025 | Y Sarvani, Developer Advocate at InfraCloud Technologies

The rapid growth of AI applications across industries has led to significant changes, particularly with the adoption of deep learning and generative AI, which provide a competitive advantage in industries such as drug discovery in pharmaceutical…


Autodesk

Posted on February 2, 2025

How Autodesk automates FedRAMP compliance and evidence collection Like many large software producers, Autodesk’s concerns about supply chain security across the wider industry (following incidents like the Solarwinds attack) had already driven considerable improvements in its…


KitOps 1.0 release—proven in production and looking to CNCF

Posted on January 31, 2025

Member post by Gorkem Ercan, CTO, Jozu The merry band of maintainers and contributors at the KitOps project is happy to announce the 1.0 release of KitOps. Jozu kicked off the KitOps project after observing the…


From PCAP to SCAP: how Falco’s libraries, registries, and plugins enable cloud native insights

Posted on January 22, 2025

Member post by Nigel Douglas, Sysdig In cloud-native systems, understanding the behaviour of complex, distributed web apps requires powerful tools that can dissect system activity down to its core. As the CNCF graduate project Falco demonstrates,…


Cloud native solutions for SMBs: unlocking scalability and resilience

Posted on December 20, 2024

Ambassador post by Angel Ramirez, CEO of Cuemby and CNCF ambassador. As the technology landscape evolves, businesses must embrace innovations that enable them to adapt and thrive. Cloud-native technologies, championed by the CNCF community, have emerged…


What is authorization? Examples and definitions

Posted on December 9, 2024 | Omu Inetimi

Member post originally published on Cerbos’s blog by Omu Inetimi When building a secure application, there are plenty of factors to be considered. Who is allowed into the application, how users are allowed in, measures in…


Open source spirit: elevating team collaboration and innovation

Posted on November 22, 2024 | Leo

Ambassador post by Leo Pahlke, CNCF Ambassador and CNCF TAG Environmental Sustainability Chair Open source is a fascinating space, where you are surrounded by emerging technologies and where you can directly engage with and have an…


How Fastly used Kubernetes to scale our platform engineering practice

Posted on November 21, 2024 | Hannah Aubry

Member post originally published on Fastly’s blog by Hannah Aubry About five years ago, Fastly had a problem with scale. No, not our network. Fastly’s network continues to scale effortlessly, including recently breezing past a 353…