Editorial Calendar
5 Reasons to Back Up Kubernetes Applications
Software containers are at the heart of cloud-native business transformation initiatives, and they are a natural evolution from virtual machines to a more granular and portable application environment in clouds. Containers are ...
Threat Stack Deepens Threat Discovery Reach for Amazon EKS
Threat Stack announced today it is extending its threat monitoring platform for the public cloud service from Amazon Web Services (AWS) to include the Amazon Elastic Kubernetes Service (Amazon EKS) on the ...
SODA Foundation Extends Open Source Storage Reach to K8s
The SODA Foundation has added support for the container storage interface (CSI) used to attach storage systems running its open source software-defined storage (SDS) software to Kubernetes clusters. In addition to providing ...
Misconfigured Argo Workflows Expose K8s to Attack
With the use of Kubernetes growing rapidly among enterprises comes increased opportunities for attackers to exploit the popular container orchestration platform’s weaknesses in security. This week, security specialist Intezer has detected a ...
Aqua Security Survey Surfaces Container Security Knowledge Gap
Aqua Security today published a survey that polled a mix of 150 cloud-native security practitioners and IT executives that suggests awareness of potential container security issue is dangerously low at a time ...
Using Containers to Enable AI at the Edge
When the COVID-19 crisis struck, medical professionals quickly realized that this unprecedented situation required them to think differently and use cutting-edge technology; they soon recognized the value of applying artificial intelligence (AI) ...
Sysdig Acquires Apolicy to Automate Container Security
Sysdig today announced it intends to acquire Apolicy to add an ability to automate remediation of container infrastructure misconfigurations provisioned using tools such as Terraform. Terms of the deal were not disclosed ...
The What and Why of Cloud-Native Security
On the road to embracing DevOps, many IT organizations still depend on traditional security practices, policies and tools that were not built to withstand the modern cloud-native approaches of scaling and complexity ...
Kubernetes Maturity Phase 4: Security, Efficiency and Reliability
In our earlier articles, we introduced the Kubernetes maturity model, discussed how to prepare for Kubernetes, explored the transformation phase, planned deployment and built confidence in successful deployment. Now, you’re ready to ...
Analyzing the Recent ‘Kubernetes and Cloud Native Operations’ Report – Techstrong TV
Alan and David discuss the findings of our recent ‘Kubernetes and Cloud Native Operations Report.’ Alan Shimel: Hey, everyone. Welcome to another segment on Techstrong TV ...

