Search results for: security audit


CNCF On-Demand Webinar: Kong Ingress Controller – Kubernetes Ingress On Steroids

Posted on October 13, 2021

Have you ever find yourself in a situation when all your services are running in Kubernetes, and now you need to expose them to the outside world securely and reliably?Ingress management is an essential part of…


Falco plugins early access

Posted on October 12, 2021

Project guest post originally published on the Falco blog by Mark Stemm One of the upcoming features in Falco that we’re really excited about is the ability to extend Falco’s functionality by using plugins. We’ll be…


GitOps 101: What’s it all about?

Posted on September 28, 2021 | Andrew Zola

Guest post originally published on Magalix‘ blog by Andrew Zola If you think GitOps sounds a bit like DevOps, you would be right. GitOps is essentially an operational framework that uses DevOps best practices. In this scenario, we basically…


IBM implements remote attestation on Linux with a hardware root-of-trust using Keylime

Posted on July 6, 2021 | Michael Peters & Gheorghe Almasi

Guest post by Michael Peters (Red Hat) & Gheorghe Almasi (IBM) If your organization is managing hundreds or thousands (or hundreds of thousands) of servers, how do you make sure they haven’t been breached? You could…


What is Polaris? Kubernetes open source configuration validation

Posted on July 1, 2021 | Robert Brennan

Guest post originally published on Fairwinds’s blog by Robert Brennan, Director of Open Source Software at Fairwinds Kubernetes is an incredibly powerful platform for deploying software. The level of flexibility it provides can accommodate nearly any…


Our journey from on-prem to the cloud with Kubernetes

Posted on June 24, 2021 | Bob DeRosa

Guest post by Bob DeRosa, Senior DevOps Architect at Broadridge When you’re a global fintech leader and the foremost provider of investor communications in an ever-accelerating world, it’s essential that your applications are both reliable and…


A new kind of trust root

Posted on June 16, 2021

Announcing the Sigstore Root Key ceremony I’m thrilled to announce that the Sigstore community is holding our first Root Key ceremony on June 18th at 2pm Eastern, and I’m even more thrilled to announce that it will be…


What is Kubernetes Policy as Code?

Posted on March 29, 2021 | Kendall Miller

Guest post originally published on the Fairwinds blog by Kendall Miller From Infrastructure as Code to Policy as Code It wasn’t that long ago people started talking about Infrastructure as Code. Part of the reason why…


Kubernetes at Scale on the Public Cloud: Q&A with Forrester Research

Posted on March 5, 2021 | Corbin Pacheco

Guest post originally published on d2iq’s blog by Corbin Pacheco, Senior Director Product and Technical Marketing at D2iQ Today’s enterprises are pushing forward with their digital transformation initiatives to meet customer and market demand. The latest…


Kubernetes maturity model: expected business outcomes

Posted on February 18, 2021 | Danielle Cook

Guest post by Danielle Cook, Content Marketing Director at Fairwinds When you move to Kubernetes, you must show clear business advantages. The business outcomes expected will include cost savings over time as you have better infrastructure…