Search results for: security audit


68 New Members Join the Cloud Native Computing Foundation

Posted on March 8, 2022

Steady growth sees CNCF hit over 775 members, joining together to enable innovation across industries through open source cloud native technology adoption SAN FRANCISCO, Calif. – March 8, 2022 – The Cloud Native Computing Foundation® (CNCF®),…


You can establish reliable Kubernetes clusters without losing sleep

Posted on March 1, 2022 | Kendall Miller

Guest post originally published on Fairwinds’ blog by Kendall Miller Full service ownership of Kubernetes, much like the tenets of DevSecOps, is a codifying process whereby all teams maintain complete control over their products and services….


Secrets management: essential when using Kubernetes

Posted on January 25, 2022 | Sebastiaan Kok

Guest post originally published on True‘s blog by Sebastiaan Kok In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management…


Top GitOps tactics to build secure cloud native infrastructure

Posted on January 7, 2022 | Andrew Zola

Guest post originally published on Magalix’s blog by Andrew Zola GitOps adoption is on the rise, driven by enterprise migration to the cloud. We can attribute its growing popularity to its efficiency in streamlined infrastructure management….


The Kubernetes’ open source tools to check out in 2022

Posted on December 15, 2021 | Jonathan Kaftzan

Guest post originally published on ARMO’s blog by Jonathan Kaftzan, VP Marketing & Business Development at ARMO In 2014, Kubernetes surfaced from work at Google and quickly became the de facto standard for container management and orchestration. Despite…


MITRE ATT&CK Matrix for Kubernetes

Posted on October 19, 2021 | Rahul Sharma

Guest post originally published on the Magalix blog by Rahul Sharma Overview Last year, CNCF reported an extraordinary 300% increase in Kubernetes adoption from 23% in March 2016 to 92% in July 2020. The data clearly outlines Kubernetes…


CNCF On-Demand Webinar: Kong Ingress Controller – Kubernetes Ingress On Steroids

Posted on October 13, 2021

Have you ever find yourself in a situation when all your services are running in Kubernetes, and now you need to expose them to the outside world securely and reliably?Ingress management is an essential part of…


Falco plugins early access

Posted on October 12, 2021

Project guest post originally published on the Falco blog by Mark Stemm One of the upcoming features in Falco that we’re really excited about is the ability to extend Falco’s functionality by using plugins. We’ll be…


GitOps 101: What’s it all about?

Posted on September 28, 2021 | Andrew Zola

Guest post originally published on Magalix‘ blog by Andrew Zola If you think GitOps sounds a bit like DevOps, you would be right. GitOps is essentially an operational framework that uses DevOps best practices. In this scenario, we basically…


IBM implements remote attestation on Linux with a hardware root-of-trust using Keylime

Posted on July 6, 2021 | Michael Peters & Gheorghe Almasi

Guest post by Michael Peters (Red Hat) & Gheorghe Almasi (IBM) If your organization is managing hundreds or thousands (or hundreds of thousands) of servers, how do you make sure they haven’t been breached? You could…