The voice of Kubernetes experts report 2024: the data trends driving the future of the enterprise
Guest post by Rajiv Thakkar, Director of Product Marketing, Portworx, Pure Storage (LinkedIn) Today, June 6, marks the 10th anniversary of Kubernetes. Kubernetes originally began as a project in Google and was released as open source…
Love, hate, and policy languages: an introduction to decision-making engines
Community post by Gabriel L. Manor, Director of DevRel at Permit.io Domain-specific declarative languages have been a huge part of software development since its early days. Created to tackle the complexities and specialized requirements that general-purpose…
Cloud Native Live: GitOps for Application Authorization
The authorization logic for determining whether a user can do an action on a specific resource inside of the application code is some of the most sensitive and impactful if it isn’t correct. Using modern GitOps…
K8s Benchmark Report: are organizations meeting NSA hardening checks?
Member post originally published on Fairwinds’s blog by Joe Pelletier The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) continue to update their Kubernetes hardening guidance, making recommendations to help organizations ensure they are hardening their Kubernetes…
WebAssembly on Kubernetes: the practice guide (part 02)
Community post by Seven Cheng | View part one here In the previous article, I gave an overview of Wasm’s features and advantages. I also explained how to run Wasm modules within container environments. In this…
KubeCon + CloudNativeCon Europe 2024 day 3: The power of sustainable computing
It’s a time of more: more data, more workloads, and more powerful technologies. So it’s critical to ask ourselves how cloud native can help improve our environmental footprint. Here’s what we heard at today’s keynotes. Keynotes:…
Why your logging data and bills get out of hand
Member post originally published on Logz.io’s blog by Dotan Horovits In the labyrinth of IT systems, logging is a fundamental beacon guiding operational stability, troubleshooting, and security. In this quest, however, organizations often find themselves inundated with a…
Securing services meshes easier with Kyverno
Project post originally published on Kyverno’s blog Service meshes are all too common these days in Kubernetes with some platforms even building them into clusters by default. Service meshes are no doubt useful in a variety…
Policy-as-Code in the software supply chain
TAG post by members of TAG security including Marina Moore, Michael Lieberman, John Kjell, James Carnegie, and Luca Bandini Reviewers: Emily Fox, Andrés Vega, Andrew McNamara, Andrew Block, Jon Zeolla, Andrew Martin Introduction Software supply chain…
Cloud Native Live: Securing the secrets manager with KubeArmor
Sample Policy BlockingShow recommendation of Policies and Violate and showcase themDemo about both audit and block modeZero TrustIntroduction to ObservabilityTalk about performance and option to change visibility configurationCreate a partial process whitelisting policyShow Default Posture Audit…