Features

DevOps World 2022: Cloud-Native Will Force CI/CD Issue
It may have taken longer than anyone initially expected, but the cloud-native era for building and deploying applications has finally arrived. Nearly every major application development initiative being launched today is based ...

Are You Ready for Cloud-Native?
The world is embracing cloud-native application architectures. Last year, Gartner predicted that more than 95% of all new applications will be cloud-native by 2025. This is up from only 30% in 2021 ...

Solo.io Announces Beta Release of GraphQL for Gloo Edge – TechStrong TV
Today, Solo.io, the application networking company, announces major product news that includes Gloo Mesh 2.0, at Solo’s annual community-driven virtual event, SoloCon. SoloCon is Solo.io’s one-stop shop for participants to learn the ...

NSA Security Best Practices for Kubernetes
In this series, I’ve outlined why every organization should care about the NSA’s Kubernetes Hardening Guidelines and examined different areas of the guidelines. What you may suspect is that most of the ...

Dell Allies With Red Hat to Build OpenShift Platforms
Dell Technologies and Red Hat this week announced a collaboration through which instances of the Kubernetes-based Red Hat OpenShift platform will be made available on systems from Dell. Caitlin Gordon, vice president ...

Weaveworks Adds Progressive Deployment for Kubernetes
Weaveworks this week delivered an update to its GitOps platform that enables application development and deployment teams to progressively deploy applications in a way that makes it simpler to recover in the ...

Sysdig Simplifies Container Security Remediation
Sysdig today announced it is adding a guided remediation tool along with a checklist to help organizations better prioritize their container remediation efforts. Alba Ferri, senior manager for product marketing at Sysdig, ...

Containing Container Security Threats
As cloud adoption and digital transformation increase, more sensitive data from applications is being stored in containers. This is why effective container security controls to securely manage application connectivity are an absolute ...

The Way Forward for K8s Security: Eliminate Standing Privileges
If you have worked in cloud computing, DevOps or related fields in recent years, you’ve no doubt come across Kubernetes. One of the earliest and most popular open source container orchestration systems, ...

NSA Wants Strong Kubernetes Authentication and Authorization
When I want to get into my phone, I use a passcode or face ID to authenticate. When I want to get into my home, I use a key because no person ...