Features

Bridging Observability & Security in Kubernetes: Beyond Just Metrics
Kubernetes has expanded agility but also the attack surface. Alan argues that observability and security can no longer live in silos — metrics, logs, and traces already hold critical security signals, while ...
Alan Shimel | | anomaly detection, C2 traffic, cloud native security, convergence, cross-training, crypto-mining, devops, kubernetes, lateral movement, logs, metrics, observability, observability-driven security, OpenTelemetry, organizational silos, platform engineering, runtime security, security, SRE, tool sprawl, traces

GitOps at Fleet Scale: Decentralization vs. Control
Alan unpacks Red Hat’s agent-based GitOps architecture for OpenShift and what it means for scaling GitOps across fleets of Kubernetes clusters. From central control to decentralized agents, discover how balance drives the ...

CNCF, Docker Partnership Streamlines Container Security, Operations
CNCF and Docker partner to boost open source projects with security, scalability and trusted container delivery through Docker’s DSOS program ...
Nathan Eddy | | cloud native security, CNCF Docker partnership, CNCF projects Kubernetes Prometheus Envoy OpenTelemetry, container image provenance, container registry scalability, container security, DevSecOps open source, Docker Hub trusted images, Docker Hub usage insights, Docker Scout vulnerability scanning, Docker Sponsored Open Source, DSOS program, open source maintainers, open source software supply chain security

CNCF and Docker: The Next Phase of Cloud Native Supply Chain Evolution
The CNCF–Docker partnership strengthens cloud native supply chain security with verified namespaces, SBOMs, and signed images. Trust becomes the new baseline ...

The Cloud-Native Frontier is at the Edge
The future of cloud-native is hybrid and edge. Learn how WebAssembly (WASM) complements containers to power next-gen workloads with speed, security and agility ...

WebAssembly 3.0 Delivers Major Performance and Language Support Upgrades
WebAssembly 3.0: Garbage collection, 64-bit memory, multiple memories and tail calls to make high-level language compilation easier ...

Tigera Extends Project Calico Reach to Secure AI Workloads
Tigera this week added an instance of its integrated container networking and security platform for Kubernetes environments that is specifically designed for artificial intelligence (AI) workloads. Based on open source Project Calico ...

OpenTofu and the New Era of Infrastructure as Code
Terraform’s license shift sparked OpenTofu’s rise. Alan explores how IaC now thrives with both HashiCorp’s Terraform and CNCF’s OpenTofu shaping the future ...
Alan Shimel | | Business Source License BUSL, cloud infrastructure automation, cloud-native infrastructure, CNCF OpenTofu, HashiCorp license change, IaC, IaC ecosystem, IaC governance, IaC innovation, IaC strategy for enterprises, infrastructure as code, Linux Foundation, MPL to BUSL, open source IaC, OpenTofu, OpenTofu roadmap, Terraform, Terraform providers, Terraform vs OpenTofu, vendor lock-in

Supply Chain Security: Cloud Native’s Weakest Link?
For years, the conversation in security revolved around networks, firewalls, and endpoints. The perimeter was king. But in the cloud-native era, the old perimeter has dissolved into microservices, APIs, and pipelines. What’s ...

Runtime Visibility: The Missing Layer in Cloud-Native Security
Cloud-native security can’t rely on old perimeter defenses. With workloads spinning up in seconds, runtime visibility is now the missing layer leaders must prioritize. Learn why observability is security, how tools like ...