Amazon ECS cloud-native configuration eBPF

5 DevOps Use Cases for Amazon ECS

Amazon ECS is a scalable, secure container management service that makes it easy to manage Docker containers as a cluster ...
cloud native open source Red Hat OpenShift edge Tanzu Docker Kubernetes

The Hidden Costs of Cloud-Native Open Source

Optimal open source use in the cloud-native stack means planning for the tradeoff expenses that can crop up ...
security IaC containers secure

Security in Container Orchestration

As containers become popular cloud-native software development, ensuring their security is the highest priority ...
containers, container security, GenAI, Cado VMware container security

Cado Security Labs Identifies Campaign to Compromise Docker Hosts

Cado Security identified an ongoing effort to abuse Docker containers using a 9hits service to create fraudulent web traffic ...
Docker, Trend Micro, SIEM attack Aqua Security CyberArk pen testing Accurics

SIEM for Containerized Environments

SIEM can help address some of the key security challenges of Docker, Kubernetes and related technologies ...
scanning, cloudsmith, stateless ephemeral stateful security Kubernetes unikernel Sumo Logic

Ephemeral Workloads: Embracing Stateless Cloud-Native Applications

From web servers to CDNs, stateless applications are the perfect solution for any application that does not require any state information to function.  ...
LOKI CRD vulnerability

Unleashing the Power of LOKI: Linux, OpenStack and Kubernetes Infrastructure

In the dynamic landscape of cloud infrastructure, the convergence of Linux, OpenStack and Kubernetes is shaping a formidable infrastructure stack known as LOKI ...
data, Grafana, OpenTelemetry Argo NeuVector Extends Red Hat OpenShift Availability

OpenTelemetry for Containerized Environments

By providing a unified approach to telemetry data capture, OpenTelemetry aims to make observability more accessible to all developers ...
Kubernetes Carbonetes

Overcoming Chaos in Kubernetes Certificate Management

Kubernetes requires a sophisticated approach to certificate management that must span a vast array of configurations and dependencies ...
zero-trust services cloud-native permissions CNCF SOA vs. Microservices Monitoring

Best of 2023: Top 9 Microservices Design Patterns

There are several microservices design patterns, each with its unique characteristics and use cases. Here are nine to consider ...