Search results for: security audit


Accelerating digital transformation: what every CEO needs to know about software delivery automation

Posted on January 5, 2021 | Sunil Mavadia

Guest post originally published on CloudOps blog by Sunil Mavadia, Director of Global Solutions Architecture at Cloudbees We have all heard the term “digital transformation,” and we often ask ourselves why many companies struggle to define…


Why Linkerd doesn’t use Envoy

Posted on December 11, 2020 | William Morgan

Guest post originally published on Linkerd’s blog by William Morgan, CEO at Buoyant Why Linkerd doesn’t use Envoy In this article I’m going to describe why Linkerd isn’t built on Envoy. This is a bit of a…


CNCF Releases Free Training Course Covering Basics of Service Mesh with Linkerd

Posted on November 10, 2020

Introduction to Service Mesh with Linkerd is the newest training course from CNCF and The Linux Foundation. This course, offered on the non-profit edX learning platform, can be audited by anyone at no cost. The course…


For PayIt, cloud native is a ‘competitive advantage’ for getting government services online

Posted on October 20, 2020

So much of our daily lives happen online these days, and yet the average adoption rate for a digital government service is less than 20%. PayIt’s founders set out to boost that number by offering a…


PayIt

Posted on October 20, 2020

So much of our daily lives happen online these days, and yet the average adoption rate for a digital government service is less than 20%. PayIt’s founders set out to boost that number by offering a…


The first Authoritative Guide on Harbor is now available in Chinese

Posted on October 14, 2020

Today we are excited to share a new book from the maintainers and contributors of the graduated project Harbor. We were very excited to announce the graduation of Harbor this summer. Harbor was the first project…


A better faster CNCF.io

Posted on October 8, 2020 | Chris Abraham

Just over a month ago we released this new version of CNCF.io.  We had spent the previous 9 months rewriting the site from scratch to accomplish the following goals: Improve the speed of the site, both…


A Practical Guide to Kubernetes Logging

Posted on October 5, 2020 | Dotan Horovitz

Guest post originally published on the Logz.io blog by Dotan Horovitz, Logz.io Kubernetes has become the de-facto industry standard for container orchestration. It provides the required abstraction for efficiently managing large-scale containerized applications with declarative configurations,…


Simplify Kubernetes Resource Access Control using RBAC Impersonation

Posted on September 17, 2020 | Juanjo Ciarlante

Guest post originally published on Bitnami by Juanjo Ciarlante Introduction Kubernetes, like any other secure system, supports the following concepts: Authentication: Verifying and proving identities for users and groups, and service accounts Authorization: Allowing users to…


Introducing Policy As Code: The Open Policy Agent (OPA)

Posted on August 13, 2020 | Mohamed Ahmed

Guest post originally published on the Magalix blog by Mohamed Ahmed What Is OPA? It’s a project that started in 2016 aimed at unifying policy enforcement across different technologies and systems. Today, OPA is used by giant players…