Topics
Top K8s Workload Trends in the 2024 Kubernetes Benchmark Report
As DevOps, platform engineering and development teams leverage Kubernetes, they must examine workload reliability, security and cost efficiency ...
CNCF Advances Strimzi Operator for Kafka on Kubernetes
Strimzi, which provides an Operator that enables IT teams to declaratively deploy Apache Kafka messaging software on Kubernetes clusters, has become an incubation-level project ...
KSOC Aims to Create Fingerprints for Container Images
KSOC has made available a free catalog for accessing open source container image fingerprints that detects changes to an environment ...
DH2i Adds Operator to Simplify SQL Server High Availability on Kubernetes
DH2i's Operator makes it simpler to deploy a platform for ensuring SQL Server high availability on Kubernetes clusters ...
Why Generative AI and Wasm are a Perfect Match
When it comes to AI, we can see a specific reason why WebAssembly (Wasm) is the perfect match with generative AI ...
Snyk Discloses ‘Leaky Vessels’ Vuln Requiring Docker Command Line Tool Fix
Snyk identified four vulnerabilities, collectively dubbed “Leaky Vessels,” that AppDev teams should address by updating the runc command line tool ...
Cado Security Labs Exposes Commando Cat Container Malware Campaign
Cado Security Labs today disclosed it has discovered a malware campaign, dubbed “Commando Cat,” that targets Docker API endpoints ...
Kubernetes Security Best Practices for 2024
Here's what you should be focusing on in 2024 to keep your Kubernetes environments secure ...
Sysdig Report Surfaces Major Container Security Challenges
A cloud-native security report from Sysdig found 91% of runtime scans fail and only 2% of granted permissions are being used in container environments ...
Network Topology in Containerized Environments
Managing network topology in a containerized environment can be challenging, but with the right tools and practices, it's achievable ...