Confidential computing: great for security, not for privacy
Guest post originally published on Elastisys’ blog In this post, we take a closer look at confidential computing (CC). What is it? What does it promise? Does it live up to its hype? And can companies…
How to manage three top Kubernetes security vulnerabilities
This article explains: Kubernetes and security Across various organizations, Kubernetes is being adopted at lightning rates. It is estimated that 60% of organizations have adopted this technology, and the list of companies planning on transitioning to…
How to ace the Kubernetes and Cloud Native Security Associate (KCSA) exam
Community post originally published on Medium by Giorgi Keratishvili Introduction Over the last five years, security has emerged as one of the most demanding skills in IT. When combined with the equally sought-after skill of containers,…
Get the first look at CloudNativeSecurityCon North America 2024’s schedule, add-on events, and more
The schedule for CloudNativeSecurityCon North America 2024 is now live, and is filled with 75 sessions offering practical solutions and thoughtful discussions of some of the biggest challenges in security today. The conference will be held…
K8s Benchmark Report: are organizations meeting NSA hardening checks?
Member post originally published on Fairwinds’s blog by Joe Pelletier The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) continue to update their Kubernetes hardening guidance, making recommendations to help organizations ensure they are hardening their Kubernetes…
Automated security in GitOps pipelines with Weave Policy Engine
Member post originally published on the Weaveworks blog by Twain Taylor Discover the power of Weave Policy Engine for automated security in GitOps pipelines. Strengthen your Kubernetes applications’ security and compliance with policy-as-code enforcement. Learn more….
An essential guide to achieving compliance with Kubernetes
Guest post originally published on ARMO’s blog by Oshrat Nir, Head of Product Marketing at Armo Learn about Kubernetes compliance challenges, consequences of non-compliance, and get guidance on maintaining a secure and compliant cloud environment in…
How to security harden Kubernetes in 2022
Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses…
KubeVirt becomes a CNCF incubating project
The CNCF Technical Oversight Committee (TOC) has voted to accept KubeVirt as a CNCF incubating project. KubeVirt enables users to run virtual machine workloads on top of Kubernetes in a Kubernetes-native way. It allows the migration…