Search results for: security audit


Kubernetes governance & the top 5 best practices of K8s deployment

Posted on September 25, 2023

Member post originally published on the Fairwinds blog by Joe Pelletier The widespread adoption of containerized applications has fundamentally changed how organizations develop, deploy, and manage their software infrastructure. Kubernetes is fundamental to this change, because…


Harbor Project Journey Report

Posted on September 22, 2023

Introduction Harbor is a self-hosted cloud native registry that stores, scans, and signs content such as container images as well as OCI artifacts, including Helm charts. It extends the open source CNCF Distribution project and adds…


What is Flux CD?

Posted on September 15, 2023

Guest post originally published on Weaveworks’ blog Overview Developed by Weaveworks in 2016, Flux CD is a GitOps continuous delivery tool used to streamline and automate application deployments. It started as a small, internal project; now it’s a CNCF-graduated…


Introducing the Wasm landscape (in English and Chinese)

Posted on September 6, 2023 | Chris Aniszczyk, Vivian Hu. and Michael Yuan

By Chris Aniszczyk, Vivian Hu and Michael Yuan “Containers are the new normal, and WebAssembly is the future.”   — CNCF Annual Survey 2022 key findings. Originally created as a secure sandbox to run compiled C/C++…


From chaos to consistency: a comprehensive approach to maintaining a drift-free infrastructure

Posted on September 6, 2023 | Rohit Raveendran

Guest post originally published on Facets Cloud’s blog by Rohit Raveendran This article delves into the foundational triggers of infrastructure drift, its subsequent implications, and streamlined strategies to ensure a seamless and consistent infrastructure. In today’s…


One-time pass codes for Kyverno

Posted on August 11, 2023

Community post originally published on Neon Mirrors by Chip Zoller In real life, imposed rules often have cases where exceptions may be required but on a case-by-case basis. Policy is really no different here. While prevention…


Have we reached a point of no return on managing software dependencies?

Posted on August 7, 2023 | Paolo Mainardi

Guest post originally published on Paolo Mainardi’s blog by Paolo Mainardi, Founder and CTO of Sparkfabrik Software Supply Chain security issues are hitting hard the whole OSS ecosystem; not a day goes by without a security incident going into…


10 awesome benefits of artifact management and why you need it

Posted on July 28, 2023

Guest post originally published on the Cloudsmith blog by Lee Skillen All about artifact management, alongside 10 awesome benefits that any good Artifact Management platform will provide, including added security, traceability, and control. Efficiency and organization…


From IP to identity: making cattle out of pets in cloud native

Posted on July 24, 2023

Community post by Bill Mulligan From one bit modifying the next to frontend talking to backend, IT is fundamentally about identity, who is talking to what and what is the outcome of their interaction. This concept…


From data warehouse to data fabric: the evolution of data architecture

Posted on July 21, 2023

Member post originally published on the Mia-Platform blog by Mia-Platform In the last century, data has become the lifeblood of every organization, ranging from e‑commerce giants to healthcare providers and government agencies. Collecting and managing this data…