Search results for: confidential containers


Confidential Containers

Accepted to CNCF on March 8, 2022

Confidential Containers is an open source community working to enable cloud native confidential computing by leveraging Trusted Execution Environments to protect containers and data.

Confidential computing: great for security, not for privacy

Posted on October 24, 2023

Guest post originally published on Elastisys’ blog In this post, we take a closer look at confidential computing (CC). What is it? What does it promise? Does it live up to its hype? And can companies…


How to manage three top Kubernetes security vulnerabilities

Posted on February 18, 2025 | Harlin Lipman | Senior Information Security Manager | Chronosphere

This article explains: Kubernetes and security Across various organizations, Kubernetes is being adopted at lightning rates. It is estimated that 60% of organizations have adopted this technology, and the list of companies planning on transitioning to…


How to ace the Kubernetes and Cloud Native Security Associate (KCSA) exam

Posted on October 14, 2024 | Giorgi Keratishvili

Community post originally published on Medium by Giorgi Keratishvili Introduction Over the last five years, security has emerged as one of the most demanding skills in IT. When combined with the equally sought-after skill of containers,…


Get the first look at CloudNativeSecurityCon North America 2024’s schedule, add-on events, and more

Posted on May 9, 2024

The schedule for CloudNativeSecurityCon North America 2024 is now live, and is filled with 75 sessions offering practical solutions and thoughtful discussions of some of the biggest challenges in security today. The conference will be held…


K8s Benchmark Report: are organizations meeting NSA hardening checks?

Posted on April 9, 2024 | Joe Pelletier

Member post originally published on Fairwinds’s blog by Joe Pelletier The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) continue to update their Kubernetes hardening guidance, making recommendations to help organizations ensure they are hardening their Kubernetes…


Automated security in GitOps pipelines with Weave Policy Engine

Posted on August 31, 2023 | Twain Taylor

Member post originally published on the Weaveworks blog by Twain Taylor Discover the power of Weave Policy Engine for automated security in GitOps pipelines. Strengthen your Kubernetes applications’ security and compliance with policy-as-code enforcement. Learn more….


An essential guide to achieving compliance with Kubernetes

Posted on March 24, 2023

Guest post originally published on ARMO’s blog by Oshrat Nir, Head of Product Marketing at Armo Learn about Kubernetes compliance challenges, consequences of non-compliance, and get guidance on maintaining a secure and compliant cloud environment in…


How to security harden Kubernetes in 2022

Posted on June 7, 2022 | Elastisys team

Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses…


KubeVirt becomes a CNCF incubating project

Posted on April 19, 2022

The CNCF Technical Oversight Committee (TOC) has voted to accept KubeVirt as a CNCF incubating project.  KubeVirt enables users to run virtual machine workloads on top of Kubernetes in a Kubernetes-native way. It allows the migration…