Search results for: confidential containers


Confidential computing: great for security, not for privacy

Posted on October 24, 2023

Guest post originally published on Elastisys’ blog In this post, we take a closer look at confidential computing (CC). What is it? What does it promise? Does it live up to its hype? And can companies finally trust…


Get the first look at CloudNativeSecurityCon North America 2024’s schedule, add-on events, and more

Posted on May 9, 2024

The schedule for CloudNativeSecurityCon North America 2024 is now live, and is filled with 75 sessions offering practical solutions and thoughtful discussions of some of the biggest challenges in security today. The conference will be held June 26…


K8s Benchmark Report: are organizations meeting NSA hardening checks?

Posted on April 9, 2024 | By Joe Pelletier

Member post originally published on Fairwinds’s blog by Joe Pelletier The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) continue to update their Kubernetes hardening guidance, making recommendations to help organizations ensure they are hardening their Kubernetes clusters. This…


Automated security in GitOps pipelines with Weave Policy Engine

Posted on August 31, 2023 | By Twain Taylor

Member post originally published on the Weaveworks blog by Twain Taylor Discover the power of Weave Policy Engine for automated security in GitOps pipelines. Strengthen your Kubernetes applications’ security and compliance with policy-as-code enforcement. Learn more. Enterprises stepping…


An essential guide to achieving compliance with Kubernetes

Posted on March 24, 2023

Guest post originally published on ARMO’s blog by Oshrat Nir, Head of Product Marketing at Armo Learn about Kubernetes compliance challenges, consequences of non-compliance, and get guidance on maintaining a secure and compliant cloud environment in a dynamic…


How to security harden Kubernetes in 2022

Posted on June 7, 2022 | By Elastisys team

Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses and Docker…


KubeVirt becomes a CNCF incubating project

Posted on April 19, 2022

The CNCF Technical Oversight Committee (TOC) has voted to accept KubeVirt as a CNCF incubating project.  KubeVirt enables users to run virtual machine workloads on top of Kubernetes in a Kubernetes-native way. It allows the migration of legacy…


The future of Kubernetes – and why developers should look beyond Kubernetes in 2022

Posted on March 4, 2022 | By Michael Vittrup Larsen

Guest post originally published on Eficode’s blog by Michael Vittrup Larsen Kubernetes is ubiquitous in container orchestration, and its popularity has yet to weaken. This does, however, not mean that evolution in the container orchestration space is at…


How to write YAML file for Kubernetes?

Posted on March 3, 2022

Guest post originally published on the ARMO blog by Ben Hirschberg, VP R&D & Co-founder Though Kubernetes has grown in popularity, it still has a steep learning curve that can make it hard to adopt the technology. Those who can’t…


Logstash, Fluentd, Fluent Bit, or Vector? How to choose the right open-source log collector

Posted on February 10, 2022 | By Stela Udovicic

Guest post originally published on ERA Software’s blog by Stela Udovicic In this blog, we’ll discuss the most popular log collectors, including Logstash, Fluentd, Fluent Bit, and Vector. Whether you already use an open-source log collector or are…