Please turn on your JavaScript for this page to function normally.
Constellation
Constellation: Open-source, runtime-encrypted Kubernetes

Confidential Computing is a hardware-based technology that shields computer workloads from their environments and keeps data encrypted during processing. In this Help Net …

Kubernetes
Best practices for Kubernetes security in the enterprise market

As part of digital transformation, more and more organizations are transforming their application using cloud native architecture to become more agile and accelerate time to …

DevSpace 6: Client-only developer tool for cloud-native development with Kubernetes

Loft Labs released DevSpace 6, open-source software for Kubernetes that enables users to develop, troubleshoot and deploy cloud-native software faster. DevSpace is a …

Kubernetes
Organizations grew to love Kubernetes: Usage in production is high

Kubernetes is delivering business value and is set to win an increasing share of production workloads, with almost all respondents to a Dimensional Research study saying they …

Kubernetes
Kubernetes security: Shift-left strategies and simplifying management

Kubernetes (K8s) is undoubtedly on the rise. According to the State of Cloud Development report by SlashData, this open-source container orchestration platform is already …

Kubernetes
How to properly adopt and manage Kubernetes in production

Kubernetes is a very important technology in the marketplace because vendors, ISVs, end users and enterprises are all able to come together and use this common infrastructure …

Kubernetes
Only 13.5% of IT pros have mastered security in the cloud native space

Canonical released data from a survey revealing the goals, benefits, and challenges of cloud-native technologies. The report has surveyed more than 1,300 IT professionals over …

Sigstore
Sigstore: Signature verification for protection against supply chain attacks

Software supply chain attacks have been increasing over the past few years, spurring the Biden administration to release an executive order detailing what government agencies …

Kubernetes
3 key elements to protect a Kubernetes cluster

Kubernetes changed how we structure, deploy, and run our applications and became a de-facto standard for running infrastructure at scale. With the rapid adoption of …

Kubernetes
Principles for Kubernetes security and good hygiene

Traditional methods of software security are not a good fit for Kubernetes: a renewed set of security implementations are required to make it less vulnerable. What’s …

The value of running stateful applications on Kubernetes

A survey by ionir shows that 60% of respondents are running stateful applications on Kubernetes, and of those who aren’t already, 50% plan to do so in the next 12 …

Kubernetes
How prepared are organizations to face a ransomware attack on Kubernetes?

Veritas Technologies announced the results of a new study revealing that the majority of organizations are underprepared to face threats against their Kubernetes environments. …

Don't miss

Cybersecurity news