WebAssembly

Extending the Envoy Proxy With WebAssembly

As the service mesh landscape continues to grow, its underlying technology stack is maturing as well. For example, service mesh advocates are introducing methods to extend Envoy, the open source proxy at ...
containers, security, air-gapped, Kubernetes, air gapped SUSE container Weaveworks container security ThreatStack Qualys

Qualys Secures Containers Using Lightweight Agent

Qualys today announced Container Runtime Security, a new approach to securing containers that makes use of functions to enable agent software that applies security policies to be embedded within a container. Sumedh ...
Kubernetes security FusionAuth secure container images

5 Best Practices for Ensuring Secure Container Images

Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will be in production. For containerized workloads, securing the container image throughout the ...
Kata

Kata Container Security is Good, but There’s an Achilles Heel

In an age where security is paramount, addressing the vulnerabilities in Kata containers has never been more important. What does container security have to do with ancient Greek mythology? Quite a lot ...
managed services

Managed Cloud-Native Services on the Rise

A report published by Information Services Group (ISG) suggests the complexity of cloud-native technologies such as Kubernetes and emerging service mesh platforms is driving more organizations toward consuming managed services delivered via ...
security compliance, NSA Kubernetes stateful kubernetes k8s Kublr

Accelerating Kubernetes Development

What comes after CLIs and dashboards? An extensible Kubernetes IDE could benefit developers, operators and technology/solution providers in the CNCF ecosystem Building a tool for Kubernetes developers means solving a bunch of ...
chaos eng AIOps platform

Carbon Relay Extends AIOps Platform to Kubernetes HPA

Carbon Relay announced this week that its Red Sky platform for configuring and optimizing container applications using machine learning algorithms now also makes it possible to scale Kubernetes clusters more efficiently. Company ...
containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

What Will It Take to Shift Kubernetes Security Left?

Considering Kubernetes security must come earlier in the development journey Interest in Kubernetes has skyrocketed. A recent CNCF study found 84% of companies run containers in production, and 78% are using Kubernetes ...
IBM AT&T

IBM, AT&T Ally on Managed Red Hat OpenShift Service

IBM and AT&T announced today that IBM will manage a service based on the Red Hat OpenShift platform on behalf of AT&T customers looking to deploy applications at the network edge and ...
access policy engines

Policy Engines: Ensuring Configuration Security in Kubernetes

Given their ease of use, flexibility and level of automation they deliver, policy engines have become a required component in Kubernetes clusters Kubernetes’ adoption in the enterprise has clearly grown beyond the ...