Kyverno Certified Associate (KCA)
Position yourself as an expert in managing and securing Kubernetes environments. Kyverno expertise shows you understand the advanced aspects of cloud management and security, one of today’s most in-demand skill sets. Cost $250 | Online Exam…
Managing threat intelligence in Falco
Falco has become a vital tool for security practitioners seeking to safeguard containerized and cloud-native environments. Leveraging the power of eBPF (Extended Berkeley Packet Filter), Falco monitors system calls and audit events, allowing it to detect…
L’informaticien: “Cert-manager en graduation à la CNCF”
Pour obtenir le statut de graduation, le projet a réalisé un audit de sécurité financé par la CNCF, mis à jour sa documentation de gouvernance pour permettre aux contributeurs de devenir mainteneurs, travaillé avec TAG Security…
Announcing Kyverno release 1.13!
Project post originally published on the Kyverno blog Kyverno 1.13 released with Sigstore bundle verification, exceptions for validatingAdmissionPolicies, new assertion trees, generate enhancments, enhanced ValidatingAdmissionPolicy and PolicyException support, and tons more! Wednesday, October 30, 2024 Kyverno…
OpenTelemetry Is expanding into CI/CD observability
SIG post by Dotan Horovits and Adriel Perkins, Project Leads, SIG CI/CD Observability, OpenTelemetry We’ve been talking about the need for a common “language” for reporting and observing CI/CD pipelines for years, and finally, we see…
Member post originally published on Tetrate’s blog by Cristofer TenEyck and Jimmy Song Introduction In the evolving landscape of cloud-native applications, securing service meshes across multiple clusters is crucial for ensuring both security and compliance. Istio,…
Cultivating a successful engineering culture with Platform Engineering
Community post by Or Weis Discover how leveraging a policy-as-code platform helps foster an engineering culture focused on efficient authorization and access control. Platform engineering is rooted in a fundamental principle: cultivating a culture within development…
What is zero trust authorization?
Member post originally published on Cerbos’s blog by Twain Taylor Traditional security models, which rely on perimeter-based defenses, have proven to be quite inadequate in the face of sophisticated attacks and the growing adoption of cloud…
Kubernetes CI/CD pipeline with Jenkins and Devtron
Member post originally published on Devtron’s blog by Bhushan Nemade TL;DR: Build a powerful Kubernetes CI/CD pipeline using Jenkins and Devtron. In the previous blog on Jenkins, we already covered how to set up a Jenkins pipeline,…
Getting Otel metrics flowing in minutes (literally) Three years ago, Lockheed Martin’s Enterprise Operations team knew something had to change. To keep the security and audit logs off the main systems they needed scalability but all…