Search results for: open policy containers


Top four Kubernetes attack chains and how to break them 

Posted on January 4, 2024 | By Oshrat Nir

Member post originally published on ARMO’s blog by Oshrat Nir, Developer Advocate at ARMO While Kubernetes adoption continues to soar, it has become a prime target for cyberattacks. Unfortunately, Kubernetes clusters are complex and can be difficult to secure….


Kubernetes rightsizing: save money and improve performance

Posted on December 28, 2023 | By Andy Suderman

Member post originally published on Fairwinds’s blog by Andy Suderman Kubernetes rightsizing is the process you use to ensure that your Kubernetes cluster has the right amount of resources to run your workloads efficiently. K8s rightsizing includes CPU,…


Codebreaking clouds: hacking cloud native environments through VAPT mastery

Posted on December 13, 2023 | By Simone Ragonesi

Member post originally published on SighUP’s blog by Simone Ragonesi Discover all you need to know about Cloud-Native Vulnerability Assessment and Penetration Testing (VAPT) with practical examples. Introduction This article embarks on a journey into the realm of Cloud-Native…


KubeAdmiral: next-generation multi-cluster orchestration engine based on Kubernetes

Posted on November 24, 2023

Member post originally published on the Bytedance blog by Gary Liu Project link: https://github.com/kubewharf/kubeadmiral Since its release in 2014, Kubernetes has become the de facto standard for cloud native orchestration and scheduling systems, delivering substantial value to infrastructure…


Top 5 tips for better Kubernetes self service

Posted on November 21, 2023 | By Robert Brennan

Member post originally published on Fairwinds’s blog by Robert Brennan, Director of Open Source Software at Fairwinds. When you’ve got a medium- to large-sized company, you need a platform to help your application teams ship code into production…


Securing attacks targeted at user or kernel level for customer X with KubeArmor & AWS Bottlerocket

Posted on October 26, 2023 | By AccuKnox

Member post by AccuKnox Introduction: In the realm of cybersecurity, ensuring that virtualized or cloud-based infrastructures security is paramount. One crucial aspect is safeguarding applications where most of our crown-jewel sits and are susceptible to dynamic changes. In…


Cloud Native Computing Foundation Continues to Drive Global Cloud Native Growth as 36 New Silver Members Join

Posted on October 18, 2023

Cloud native technology continues to make an impact across industries and geographies SAN FRANCISCO, Calif. – October 18, 2023 – The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced today that 36…


Only one label to improve your Kubernetes security posture, with the Pod Security Admission (PSA) — just do it!

Posted on October 12, 2023

Community post originally published on Medium by Mathieu Benoit In Kubernetes 1.25 as stable (and since 1.23 as beta), the Pod Security admission (PSA) controller replaces PodSecurityPolicy (PSP), making it easier to enforce predefined Pod Security Standards (PSS) by simply adding a label to…


Secure your Kubernetes environment with OPA and Gatekeeper

Posted on October 9, 2023

Guest post originally published on SighUP’s blog by Simone Ragonesi We will introduce you to the powerful combination of Open Policy Agent (OPA) and Gatekeeper for Kubernetes security. In this article, we will introduce you to the powerful combination…


Kubernetes security: best practices for Kubernetes secrets management

Posted on September 28, 2023 | By John Walsh

Guest post originally published on the CyberArk blog by John Walsh Kubernetes has come a long way since its inception. But as the adoption of containerization has grown, Kubernetes security continues to be top of mind. Red Hat’s “The State of…