SUSE, Nutanix, kubernetes, cycle, Mirantis, kubernetes, LoftLabs, vNode, Komodor, configurations, application, clusters, virtual, Red Hat, Kubernetes clusters, Komodor, kubernetes, clusters, kubernetes, IDPs, TLS, certificates, clusters, virtual clusters, Kubernetes, Kubernetes, vCluster CAST AI KBOM DoKC Platform9 Kubernetes

Thwarting Ransomware Attacks in Kubernetes Environments

 In this episode of The View With Vizard, Cloudian CTO Gary Ogasawara explains how to thwart ransomware attacks in Kubernetes environments. The video is above and a transcript of the conversation ...
Komodor NeuVector Portworx Kubernetes

Migration to Containers, Microservices and Kubernetes

Mirantis CEO Adrian Ionel reflects on the state of Kubernetes two years after acquiring Docker Enterprise. Video is below followed by a transcript of the conversation with Mike Vizard.  Male:                          This ...
OpenTelemetry containerization container security ZTNA SASE

Securing Containers With Zero-Trust Tools

As container environments grow in complexity, container security requires a different security approach. Container security must consider everything from the applications running in containers to the infrastructure on which those containers run.  ...
AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Mirantis Adds Lens Pro Edition to IDE Portfolio for Kubernetes

Mirantis has made available a Lens Pro edition of its cloud-native application integrated development environment (IDE) that includes a local instance of Kubernetes. That instance can be automatically provisioned along with on-demand ...
| | IDE, kubernetes, Lens IDE, Mirantis
Using Kubernetes to Secure Data

Using Kubernetes to Secure Data

Data loss and ransomware are two of the biggest threats to data security today, especially as malicious actors turn their attention to the cloud. Even with security perimeters in place, bad actors ...
3 Cloud-Native Database Tools From CNCF

3 Cloud-Native Database Tools From CNCF

Unless your application is entirely stateless, it will need to store and retrieve persistent data. This is where databases come in — they employ a simple query language that allows authorized users ...
AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Mirantis Acquires amazee.io to Bring NoOps to K8s

Mirantis today announced it has acquired amazee.io to advance adoption of a “ZeroOps” approach to deploying applications in Kubernetes environments. Amazee.io’s open source Lagoon platform provides a layer of abstraction that analyzes ...
security compliance, NSA Kubernetes stateful kubernetes k8s Kublr

What Are the NSA K8s Guidelines and Why Should You Care?

The NSA released its Kubernetes Hardening Guidelines almost a year ago and made updates to it this March. The purpose of the document is to provide an overview of what Kubernetes users ...
Trend Micro Tightens Container Security Integration in Cloud Platform

Trend Micro Tightens Container Security Integration in Cloud Platform

Trend Micro today extended its Trend Micro Cloud One platform to more tightly integrate its container security offering. Mike Milner, vice president of cloud technology for Trend Micro, said the latest edition ...
Defeating Kubernetes Challenges Through Monitoring

Kubernetes Troubleshooting: Finding the Right Monitoring Solution

Kubernetes is revolutionizing application development because it is designed for ease of use, flexibility and scalability. In spite of these compelling advantages, however, troubleshooting Kubernetes problems can be a formidable challenge. Once ...