Kubernetes

Survey Surfaces Where Kubernetes Clusters Are Running Most
A survey of 125 IT professionals finds that three-quarters (75%) of respondents are running Kubernetes clusters in public clouds compared to 43% running Kubernetes in a private data center ...

Komodor Adds Generative AI Tool to Simplify Kubernetes Management
Komodor today added a generative artificial intelligence (AI) agent, dubbed Klaudia, to its platform for managing Kubernetes clusters ...

Kubernetes in Multi-Cloud Environments
Kubernetes can be effectively utilized in multi-cloud environments, enabling organizations to achieve new levels of flexibility, enhance resilience and drive innovation in their cloud strategies ...

JFrog Adds Runtime Platform to Secure Cloud-Native Apps Running on Kubernetes
JFrog today at its swampUP 2024 conference revealed it has added an ability to automate real-time DevSecOps workflows spanning source code to binaries deployed in Kubernetes environments ...

Virtual Kubernetes Clusters: The Key to a Modern IDP
IDPs become internal products that can be integrated into existing workflows and provide developers all the operational resources necessary for the entire deployment process ...

Red Hat Enables OpenStack to Run Natively on OpenShift Platform
Red Hat this week made generally available an instance of the open-source OpenStack framework that runs natively on Kubernetes clusters ...

Broadcom Revamps Tanzu to Simplify Cloud-Native App Development and Deployment
Broadcom Inc. today at the VMware Explore 2024 conference unveiled a VMware Tanzu 10 platform that promises to make it easier for developers to build cloud-native applications while also providing IT teams ...

Enhancing Kubernetes Security in Your Software Supply Chains With TLS certificates
Utilizing TLS certificates properly in your software supply chains can help decrease the chances of a cybersecurity incident, such as a supply chain attack or a man-in-the-middle attack ...

Azure Flaw Highlights Need to Secure Kubernetes Cloud Clusters
A security flaw found by Mandiant in Microsoft's AKS service would have let attackers escalate privileges and steal data ...

Automating Security Compliance in GKE with Policy-as-Code
As organizations increasingly adopt Kubernetes for their container orchestration needs, ensuring security compliance across clusters becomes paramount ...