EKS Kubernetes and the Challenge of Federation

Amazon EKS Security: A Practical Guide

Amazon EKS allows developers to deploy, manage and scale containerized applications using Kubernetes ...
Kubernetes containers DevOps

How to Successfully Migrate to Kubernetes

When you’re undertaking a Kubernetes migration, there are several ways for platform engineers to minimize potential risks and enable development teams from the beginning ...
AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Uptycs Deepens CNAPP Support for Kubernetes

Uptycs' CNAPP now has the ability to detect and highlight Kubernetes security issues and misconfigurations using the Goat playground ...
Ingress Kubescape Kubernetes Docker

Are You Ready For Ingress-as-a-Service?

Most Kubernetes ingress controllers today are self-managed, but the future looks bright for ingress-as-a-service ...
SBOM Audit Docker Container Security

Sysdig Allies with Docker Inc. on Container Security

Sysdig and Docker announced the integration of Sysdig runtime insights into Docker Scout to help developers prioritize remediation efforts ...
AWS Immersion Day: Secure Container Workloads in Build-Time with Snyk

AWS Immersion Day: Secure Container Workloads in Build-Time with Snyk

With cloud deployments transforming what was traditionally ‘infrastructure’ to code, development and security teams face new, increased pressure in their attempt to build secure applications quickly. With developers in the driver’s seat, ...
|
Managing Security Posture and Entitlements in the Cloud

Managing Security Posture and Entitlements in the Cloud

Federating access and ensuring compliance across multi-cloud and hybrid environments is a challenge. This is especially true without proper visibility and processes in place to understand what’s being deployed and how to ...
|
Platform engineering, cloud native, app development, Kubernetes, developer platform Docker cloud-native applications Anchore SBOM metrics full cycle complexity software development

7 Essential Components of a Robust Kubernetes IDP

IDPs create a paved road for developers to reduce complexity and make it easier to build and deliver software without being Kubernetes experts ...
containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

Cloud-Native Security and the Risks of AI

Kubernetes security as it applies to AI involves no shortage of challenges and risks to overcome ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

OWASP Kubernetes Top 10 Overview

The OWASP Kubernetes Top 10 accumulates some of the most pressing risks and vulnerabilities associated with developing on Kubernetes ...