Search results for: security audit


Kyverno Certified Associate (KCA)

Posted on November 13, 2024

Position yourself as an expert in managing and securing Kubernetes environments. Kyverno expertise shows you understand the advanced aspects of cloud management and security, one of today’s most in-demand skill sets. Cost $250 | Online Exam…


Managing threat intelligence in Falco

Posted on November 12, 2024 | Nigel Douglas

Falco has become a vital tool for security practitioners seeking to safeguard containerized and cloud-native environments. Leveraging the power of eBPF (Extended Berkeley Packet Filter), Falco monitors system calls and audit events, allowing it to detect…


L’informaticien: “Cert-manager en graduation à la CNCF”

Posted on November 12, 2024

Pour obtenir le statut de graduation, le projet a réalisé un audit de sécurité financé par la CNCF, mis à jour sa documentation de gouvernance pour permettre aux contributeurs de devenir mainteneurs, travaillé avec TAG Security…


Announcing Kyverno release 1.13!

Posted on November 7, 2024

Project post originally published on the Kyverno blog Kyverno 1.13 released with Sigstore bundle verification, exceptions for validatingAdmissionPolicies, new assertion trees, generate enhancments, enhanced ValidatingAdmissionPolicy and PolicyException support, and tons more! Wednesday, October 30, 2024 Kyverno…


OpenTelemetry Is expanding into CI/CD observability

Posted on November 4, 2024 | Dotan Horovits + Adriel Perkins

SIG post by Dotan Horovits and Adriel Perkins, Project Leads, SIG CI/CD Observability, OpenTelemetry We’ve been talking about the need for a common “language” for reporting and observing CI/CD pipelines for years, and finally, we see…


Multi-cluster PKI + Istio recipe: practical example for a trusted and scalable PKI for your service mesh

Posted on November 1, 2024 | Cristofer TenEyck and Jimmy Song

 Member post originally published on Tetrate’s blog by Cristofer TenEyck and Jimmy Song Introduction  In the evolving landscape of cloud-native applications, securing service meshes across multiple clusters is crucial for ensuring both security and compliance. Istio,…


Cultivating a successful engineering culture with Platform Engineering

Posted on October 31, 2024 | Or Weis

Community post by Or Weis Discover how leveraging a policy-as-code platform helps foster an engineering culture focused on efficient authorization and access control. Platform engineering is rooted in a fundamental principle: cultivating a culture within development…


What is zero trust authorization?

Posted on October 25, 2024 | Twain Taylor

Member post originally published on Cerbos’s blog by Twain Taylor Traditional security models, which rely on perimeter-based defenses, have proven to be quite inadequate in the face of sophisticated attacks and the growing adoption of cloud…


Kubernetes CI/CD pipeline with Jenkins and Devtron

Posted on October 17, 2024 | Bhushan Nemade

Member post originally published on Devtron’s blog by Bhushan Nemade TL;DR: Build a powerful Kubernetes CI/CD pipeline using Jenkins and Devtron. In the previous blog on Jenkins, we already covered how to set up a Jenkins pipeline,…


Lockheed Martin

Posted on October 17, 2024

Getting Otel metrics flowing in minutes (literally) Three years ago, Lockheed Martin’s Enterprise Operations team knew something had to change. To keep the security and audit logs off the main systems they needed scalability but all…