containers Lacework zero-trust backup data recovery Red Hat Kubernetes security

Containers are Temporary – The Data Inside Is Not

Containers are maturing and becoming essential for organizations pursuing an application modernization strategy. With all their code consolidated into a single package, containers can be spun up quickly and seamlessly moved from ...
Canonical Kubernetes Kubermatic

Kubernetes 1.25 Update Focuses on Security and Storage

This week, the Technical Oversight Committee (TOC) for Kubernetes released a Combiner update to the cloud-native platform that adds more than 40 enhancements. The bulk of the enhancements delivered in Kubernetes 1.25 ...
cloud-native DevSecOps Kubernetes developer DevOps Mirantis culture kubernetes helm charts

Optimizing Developer Impact on K8s Security

Kubernetes just passed its eighth birthday (hope you didn’t forget to send a card). In that time, the DevSecOps movement has decisively shifted security left. The evolution continues to add work to ...
Linkerd, Bouyant, Honeycomb Buoyant Solo.io CNCF Linkerd Istio service mesh

Buoyant Updates Linkerd to Simplify Zero-Trust Security

Buoyant today updated the open source Linkerd service mesh to add support for route-based authorization policies that enforce zero-trust policies within microsegmented Kubernetes environments. In addition, the company is adding support for ...
TDengine Brings Open Source Time-Series Database to Kubernetes

TDengine Brings Open Source Time-Series Database to Kubernetes

TDengine today made available an update to its namesake open source time-series database so that it can now run on Kubernetes clusters. TDengine CEO Jeff Tao says TDengine 3.0 is differentiated from ...
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Preparing Your Incident Response Team for Container Incidents

The use of containers—and orchestration platforms like Kubernetes—is increasing rapidly around the globe. Analysts predict that by 2023, more than 70% of global organizations will be running more than two containerized applications ...
PerfectScale Rafay Systems Kubecost Granulate Platform9 Kubernetes Cost Controls

Granulate Tool Automatically Rightsizes Kubernetes Workloads

This week, Granulate will add a free gMaestro tool to its existing portfolio of tools for optimizing workloads on Kubernetes clusters. The new tool makes it possible to reduce overprovisioning of infrastructure ...
NSA Guidance

The NSA Wants the Network Locked Down

The NSA’s Kubernetes Hardening Guide offers a lot of advice on implementing the best defense-in-depth approach to your workloads. Part of that guide outlines how Kubernetes users can secure and harden the ...
OpenTelemetry containerization container security ZTNA SASE

Techstrong TV: Making Building Container Applications Simpler

Slim.AI CEO John Amaral explains what it will take to make building container applications simpler. The video and a transcript of the conversation are below. Recorded Voice:         This is Digital Anarchist.   Mike:                           ...
cryptojacking Docker Hub

Aqua Security Finds New Cryptojacking Technique

Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data ...