Discover how GitLab uses Falco to detect abnormal behavior in code dependencies
Project post originally published on the Falco Blog by Nate Magee and Vicente J. Jiménez Miras GitLab leverages Falco to detect software supply chain attacks with Package Hunter GitLab covers the entire software development lifecycle in a…
Guest post originally published on Flux’s blog by Daniel Holbach As the Flux family of projects and its communities are growing, we strive to inform you each month about what has already landed, new possibilities which…
Kubernetes main attack vectors tree: an explainer guide
Guest post originally published on Magalix’s blog by Andrew Zola Kubernetes is a leader in container orchestration. According to Statista, as much as 46% of respondents in a recent survey stated that they used Kubernetes for automating…
Guest post by Second State and FutureWei This work is supported by Second State and FutureWei based on Open Source projects WasmEdge and seL4. Application containers, such as Docker, are a key driving force behind the…
Kubernetes main attack vectors tree: an explainer guide
Guest post originally published on Magalix’s blog by Andrew Zola Kubernetes is a leader in container orchestration. According to Statista, as much as 46% of respondents in a recent survey stated that they used Kubernetes for automating…
Secure software supply chains: good practices, at scale
Guest post originally published on Contino Engineering‘s blog by Dan Chernoff Supply chain attacks rose by 42% in the first quarter of 2021 [1] and are becoming even more prevalent [2]. In response to secure software…
How to secure containers with Cosign and Distroless images
Guest post originally published on InfraCloud’s blog by Jeswin Ninan, Senior SRE at InfraCloud Container technology and the term “container images’’ are not new for many developers, SREs and DevOps engineers. But the need to have…
Best practices for load balancing Kubernetes containers
Guest post originally published on Snapt’s blog by Craig Risi More organizations are using containers as a mechanism for driving their cloud-native applications. Some organizations have hundreds of small containers across many different servers in different…
WebAssembly serverless functions in AWS Lambda
Guest post by Robby Qiu, Developer at Second State and contributor to WasmEdge Serverless functions save developers a ton of trouble managing the backend infrastructure. It also simplifies the development process as developers only need to…
Announcing the Sigstore Root Key ceremony I’m thrilled to announce that the Sigstore community is holding our first Root Key ceremony on June 18th at 2pm Eastern, and I’m even more thrilled to announce that it will be…