Containers
Chainguard Adds Automatic SBOM Generation Capability
Chainguard added an ability to automatically generate an SBOM for containers to its Enforce control plane to secure cloud-native applications ...
Migrating Applications to Containers
Application migration, especially to containers, is a critical task that requires careful planning and execution. And it's not without challenges ...
CNCF CTO Foresees Larger Orchestration Role for Kubernetes
Cloud Native Computing Foundation CTO Chris Aniszczyk said the role Kubernetes plays in enterprise IT environments is on the verge of expanding beyond simply orchestrating containers ...
Snowflake Embraces Containers Alongside DevOps Workflows
Snowflake made available today a private preview of an instance of its framework for building and deploying applications that can be deployed as a set of integrated containers. IT teams can also ...
Containers Vs. Virtual Machines: Why the Paradigm Shift Matters
Why are organizations migrating from virtual machines (VMs) to containers? DH2i's Don Boxley explains ...
Hybrid Cloud Architecture in 2023: How Does Kubernetes Fit In?
Hybrid cloud solutions have emerged as a favored choice for organizations aiming to enhance their IT infrastructure. By merging the advantages of public and private clouds, hybrid cloud architectures offer businesses flexibility, ...
Automating Security in Containers With DevSecOps
Containers have become incredibly popular in software development. They make it easy for organizations to quickly build, deploy and manage scalable and efficient applications. However, as more and more organizations adopt container ...
Mirantis Adds Ability to Centrally Manage Lens Dev Environments
Mirantis this week added the ability to centrally manage deployments of the enterprise edition of its Lens tools for building container applications for Kubernetes clusters. Miska Kaipiainen, vice president of product engineering ...
Can You be Cloud Native Without Being in the Cloud?
One would probably assume that being cloud native means running everything in the cloud. But this isn’t always the case. Enterprise software is typically more complex than that and is often hosted ...
KSOC Shares List of Top Eight Kubernetes Vulnerabilities
Kubernetes Security Operations Center (KSOC) has published a list of the eight Kubernetes vulnerabilities that are most likely to be exploited. The list is based on an Exploit Prediction Scoring System (EPSS) ...

