app delivery Flux Anchore Atomist Announces Software Delivery

The Future of App Delivery: The Next Five Years

Application delivery is moving fast and has recently seen significant advances in centralized control, containerization, integration and intelligence. If we follow these threads and broader industry trends, what more might we see ...
SIEM attack Aqua Security CyberArk pen testing Accurics

Your K8s Environment Was Attacked: What to Do in the First 24 Hours

Cyberattacks—every enterprise’s worst fear. It seems there’s a new headline about a company being compromised and left to deal with the fallout. While everyone from CISOs to DevOps practitioners are focused on ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Best of 2021 – 7 Principles of DevSecOps With Kubernetes

As we close out 2021, we at Container Journal wanted to highlight the most popular articles of the year. Following is the eighteenth in our series of the Best of 2021. In ...
secret Ambassador CNCF Kubernetes

Ambassador Labs Unfurls Cloud Edition of App Dev Platform

At the Kubecon + CloudNativeCon North America conference, Ambassador Labs today announced it has added a cloud edition of its application development environment for Kubernetes that intends to make it simpler for ...
platforms Rafay observability Container Security Requires a Holistic View

Observability at the Edge with OpenTelemetry

Over the past two years, our world has experienced drastic and unprecedented changes to the way that we live and work. We have all learned, quite poignantly, how global trends shape our ...
operator Red Hat Kafka Real-Time Distributed Microservices

Red Hat Extends OpenShift Integration Reach

Red Hat announced today that the suite of integration tools it provides will now include support for Apache Camel K, a lightweight framework that integrates Kubernetes clusters with the open source Apache ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

15 Point Kubernetes Security Checklist

Thoroughly securing containers and Kubernetes environments – especially in production where they’re most vulnerable – requires a layered security strategy with consistent vigilance across multiple fronts. Kubernetes itself has become an increasingly ...

Sysdig Adds Runtime Detection and Response to Secure AWS Fargate Serverless Containers

Deep visibility across containers and cloud, along with detailed audit trails required for effective incident response SAN FRANCISCO, KubeCon + CloudNativeCon Europe Virtual — May 4, 2021 — Sysdig, Inc., the secure ...
| | Sysdig
Nine Pillars of Kubernetes Best Practices

Nine Pillars of Kubernetes Best Practices

In a prior blog, I explained Nine Pillars of Engineering DevOps with Kubernetes. The nine pillars represent categories of practices. In this blog, I expand on practices for each of the nine ...
Honeycomb Buoyant Solo.io CNCF Linkerd Istio service mesh

Service Mesh Extensibility Explained

Have you ever wondered how to extend your service mesh for your specific business needs? Perhaps you need to add external authorization or advanced rate-limiting? Or maybe you want to add custom ...
Loading...