Member Post Confidential computing: great for security, not for privacy
Guest post originally published on Elastisys’ blog In this post, we take a closer look at confidential computing (CC). What is it? What does it promise? Does it live up to its hype? And can companies finally trust...October 24, 2023
Member Post Introduction: a closer look at Kubernetes and Nomad
Guest post by Rob Newsome, Head of Product Management at stack.io In the realm of container orchestration, Kubernetes and Nomad are prominent figures, each furnishing a distinct method to container management. Kubernetes is renowned for its exhaustive features...October 23, 2023 | By Rob Newsome
Ambassador Post From non-tech to CNCF Ambassador: transforming my career journey
Guest post by Julia Furst Morgado, Global Technologist at Kasten by Veeam The pandemic has brought significant changes in our lives, prompting many of us to reevaluate our career paths and make bold decisions. For me, it was...October 19, 2023 | By Julia Furst Morgado
Community Post Announcing the Kubernetes policy based governance risk and compliance paper
Guest post by Jim Bugwadia The CNCF Kubernetes Policy Working group (WG) has just released a new paper on policy based Governance, Risk, and Compliance to help educate the community about how cloud native best practices can be...October 19, 2023 | By Jim Bugwadia
Member Post Shift down to the platform, not left to the dev
Guest post originally published on Mia-Platform’s blog by Michel Murabito, Developer Advocate at Mia‑Platform. In the ever-evolving world of software development, a new approach to developing and delivering software, called shift down, has emerged to challenge conventional methods....October 18, 2023 | By Michel Murabito
Member Post Under the hood of fault tolerant private cloud network (part 2 – the how)
Guest post originally published on Netris’ blog by Alex Saroyan, CEO/co-founder at Netris This is a continuation of Article 1. If you want to learn why we spend so much time thinking about High Availability, go there. Otherwise, if...October 16, 2023 | By Alex Saroyan
Member Post What is stateless authorization?
Guest post by Charith Ellawala, Co-Founder & CTO at Cerbos In the world of software development, authorization is one of the most important aspects to consider when designing any application. Without proper authorization, an application can become vulnerable...October 13, 2023 | By Charith Ellawala
Community Post Only one label to improve your Kubernetes security posture, with the Pod Security Admission (PSA) — just do it!
Community post originally published on Medium by Mathieu Benoit In Kubernetes 1.25 as stable (and since 1.23 as beta), the Pod Security admission (PSA) controller replaces PodSecurityPolicy (PSP), making it easier to enforce predefined Pod Security Standards (PSS) by simply adding a label to...October 12, 2023