data Veeam software-defined MinIO Longhorn Storage

Keeping Kubernetes Data Safe, Sound and Actionable

As cloud-native development grows in popularity, organizations are on the hunt for tools to not only protect their containerized applications but to manage them, as well.  They’ll be busy. IDC is projecting ...
Chainguard cloud-native Tigera Kubernetes supply chain

Cloud-Native Apps Driving Major IT Data Crisis

A global survey of 1,303 CIOs and senior IT practitioners finds 71% of respondents believe the explosion of data produced by cloud-native technology stacks is beyond humans’ ability to manage. Conducted by ...
big data DH2i cloud-native database data protection Databases and Postgres in Containers

Data Protection for Stateful Applications in Kubernetes

Stateful applications: Whether or not you believe they belong in Kubernetes, the fact is most organizations run a combination of stateful and stateless workloads in containers. Stateful applications and workloads require back ...
cloud architect architecture Diamanti storage networking

ScyllaDB Adds Kubernetes Operator to NoSQL Database

ScyllaDB, a provider of an open source database based on a columnar architecture, has made available in beta an Operator to makes it easier to deploy the NoSQL platform on a Kubernetes ...
Threat Stack monolith microservices

Maintaining Data Consistency Across Microservices

When microservice applications are built as a set of modular components, they are easier to understand, simpler to test and effortless to maintain over the life of the application. They enable organizations ...
Kubernetes legacy cloud-native Hybrid HANA Clouds

The Shift to Cloud-Native Isn’t a Legacy Loss

The question will inevitably arise when an organization with on-premises operations opts to make the leap to cloud environments: what will become of investments in legacy data center infrastructure? This concern is ...
GitOps Red Hat OpenShift

Red Hat Extends OpenShift Operator to Integration Platform

Red Hat has now made it possible to install, upgrade and manage Red Hat Integration components using an operator it developed for the Red Hat OpenShift platform in addition to an existing ...
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Kubernetes Phishing: Preventing Social Engineering in Your K8s Environment

As Kubernetes becomes a mainstream platform for operating mission-critical applications, it is increasingly targeted by cybercriminals ...
SIEM attack Aqua Security CyberArk pen testing Accurics

SIEM for Containerized Environments

SIEM can help address some of the key security challenges of Docker, Kubernetes and related technologies ...
OpenTelemetry Argo NeuVector Extends Red Hat OpenShift Availability

OpenTelemetry for Containerized Environments

By providing a unified approach to telemetry data capture, OpenTelemetry aims to make observability more accessible to all developers ...