Computing: “Mercedes-Benz Tech Innovation: From ‘open source not allowed’ to ‘FOSS preferred'”
It’s good PR for large organisations to send teams of developers to present at conferences, but things are not always as they seem. Sometimes these are unrepresentative internal startups, experimenting at the cutting edge while the...
June 8, 2022
Member Post
How to security harden Kubernetes in 2022
Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses...
June 7, 2022 | Elastisys team
Community Post
Introduction to the Cloud Native Security Controls Catalog
Community post by Jon Zeolla, CTO and Co-Founder of Seiso The CNCF Security Technical Advisory Group (“Security TAG”) has provided a wealth of information to assist organizations in the planning and design of secure cloud native...
June 7, 2022
Upcoming Code of Conduct updates at CNCF
By: Chairs for CNCF Governing Board & Technical Oversight Committee CNCF Community, CNCF is in the process of improving its Code of Conduct (CoC) processes to be more transparent, include community voices and representation, and achieve...
June 6, 2022
Community Post
OSTIF’s audit of CRI-O is complete – high severity issues found and fixed
Community post originally published on the OSTIF blog Open Source Technology Improvement Fund is thrilled to report the results of a security audit of CRI-O. CRI-O is an open source software (OSS) project that is an implementation of the Kubernetes Container...
June 6, 2022 | OSTIF
Community Post
Ada Logics: CRI-O holistic security audit engagement
Community post originally on the Ada Logics blog by David Korczynski, Security Research & Security Engineering and Adam Korczynski, Security Engineering & Security Automation, Ada Logics Ada Logics Ltd. recently performed a holistic security audit of CRI-O....
June 6, 2022 | David Korczynski + Adam Korczynski
Member Post
How to test application security
Guest post originally published on the Snapt blog by Craig Risi We constantly read about leaks and security attacks that hit well-known applications. Businesses cannot take security for granted. With so much critical data in play,...
June 6, 2022 | Craig Risi
Member Post
5 key takeaways from Humanitec’s 2022 Kubernetes Benchmarking Study
Guest post originally published on Humanitec’s blog by Aeris Stewart, Community Manager at Humanitec Here are 5 things you need to know about implementing Kubernetes, based on Humanitec’s 2022 Kubernetes Benchmarking Study. Knowing your way around...
June 3, 2022 | Aeris Stewart
Member Post
Local Env as Code: Is it possible yet
Guest post by Jan Van Bruggen, Developer Relations Lead at itopia In the past decade, we’ve seen the rise, standardization and meme-ification of “as code”: Infrastructure as Code, Monitoring as Code, Policy as Code and soon...
June 2, 2022 | Jan Van Bruggen
Project Post
Flux May 2022 update
Project post originally published on the Flux blog by Daniel Holbach As the Flux family of projects and its communities are growing, we strive to inform you each month about what has already landed, new possibilities...
June 2, 2022 | Daniel Holbach