How to manage three top Kubernetes security vulnerabilities
This article explains: Kubernetes and security Across various organizations, Kubernetes is being adopted at lightning rates. It is estimated that 60% of organizations have adopted this technology, and the list of companies planning on transitioning to…
Application promotion in Devtron
Member post originally published on the Devtron blog by Siddhant Khisty TL;DR: Devtron simplifies application promotion across environments by enhancing CI/CD pipelines with GitOps. It supports seamless deployments, easy rollbacks, approval policies and audit logs, making…
Digital transformation driven by community: Kubernetes as example
Member post by Angel Ramirez, Cuemby In a rapidly evolving technological landscape, Kubernetes emerges as a transformative force in open-source innovation. Originating from a Google project in 2014, it has grown into a global movement that…
Kubernetes in 2025: are you ready for these top 5 trends and predictions?
Member post originally published on the Fairwinds blog by Andy Suderman Now that Kubernetes has turned 10, it has firmly established itself as a cornerstone of cloud-native deployment. That means it’s finally fair to request ten years…
Announcing the results of the Karmada security audit
Community post cross-posted on the OSTIF blog by Helen Woeste, Communications Manager, the Open Source Technology Improvement Fund OSTIF is proud to share the results of our security audit of Karmada. Karmada is an open source…
Platform engineering at KubeCon + CloudNative NA 2024 in Salt Lake City
Ambassador post originally published on Medium by Mathieu Benoit, CNCF Ambassador KubeCon NA 2024 in Salt Lake City was a blast! Like always, I met with old friends, I made new friends and I had deep…
CEL-ebrating simplicity: mastering Kubernetes policy enforcement with CEL
Community post by Kevin Conner, Chief Engineer, Getup Cloud and co-author of Kubernetes in Action 2nd Edition As Kubernetes deployments grow in scale and complexity, policy enforcement becomes a critical aspect of maintaining secure and reliable…
Solution Approach IBM Sterling Order Management containers are delivered as three images — om-base, om-app, and om-agent — through the IBM Entitled Registry using licensed API keys that enable customers with an easier pull access to…
Unlocking cloud native security with Cilium and eBPF
Ambassador post originally published on Dev.to by Syed Asad Raza Introduction 🌐🔒🚀 As cloud-native applications scale, securing workloads while maintaining performance becomes critical. This is where Cilium, an open-source networking, observability, and security tool, shines. Backed…
Navigating Platform Engineering pitfalls with WebAssembly components
Ambassador post by Liam Randall, CNCF Ambassador and CEO, Cosmonic We recently had the opportunity to reflect on the state of platform engineering within large companies—and the role WebAssembly has to play in the discipline’s future….