Features
Report Surfaces Scope of Overspending in the Cloud
A report published today by CAST AI, a provider of a platform for optimizing cloud costs using machine learning algorithms for Kubernetes environments, finds that on average organizations are spending three times ...
Hot Log4jShell Fix from AWS Needs a Fix on Kubernetes Clusters
Amazon Web Services (AWS) this week, after being alerted by Unit 42 security researchers at Palo Alto Networks, made available an update to a hot fix for the Log4jShell vulnerability found in ...
Canonical Expands Ubuntu Container Image Portfolio
As part of an update to its Ubuntu operating system, Canonical has added Grafana Loki, Apache Kafka and Apache Cassandra container images to the portfolio of images to which it provides long-term ...
Sysdig Shines Spotlight on Container Vulnerabilities Based on Level of Risk
Sysdig today made available a Risk Spotlight tool as part of its cloud service for securing and monitoring container environments that makes it easier to prioritize the vulnerabilities that need to be ...
WSO2 Unfurls Choreo Integration Service for Cloud-Native APIs
WSO2 has made generally available Choreo, a cloud service for integrating cloud-native microservices based on Kubernetes, Docker containers and Envoy proxy software. Asanka Abeysinghe, chief technology evangelist for WSO2, notes that IT organizations ...
VMware Updates Tanzu Platform to Ease K8s App Deployments
VMware has made generally available an update to its Tanzu Application Platform that makes it simpler to deploy and manage application workloads across multiple Kubernetes clusters. In addition, VMware includes support for ...
5 Best Practices for Cloud-Native Permissions
Cloud-native/microservices-based products are complex, and so is building access control and managing permissions for these products. And it’s only getting worse with each pull request. Most developers end up building authorization or ...
Outwitting the New CRI-O Vulnerability
If you’re a CRI-O user, there’s a newly discovered vulnerability that could affect you. It’s called CVE-2022-0811 and it was discovered by CrowdStrike cloud security researchers. While it can’t be exploited by ...
Spot Check: Guide to K8s Spot Node Savings
Hesitant about introducing spot nodes into your Kubernetes clusters? You’re not alone. Despite their bargain value, the fact that spot nodes offer no availability guarantees can make leveraging them feel like a ...
7 CNCF Tools for Scheduling and Orchestration
Container managers like Kubernetes have become critical to managing large numbers of containers. By running containers in a cluster—a group of machines—a system can optimize how each application consumes memory. Automating these ...

