Arm infrastructure database as a service

Why ‘Continuous Restore’ is a Game-Changer in a Data-Driven World

Distributed environments consisting of core, edge and cloud computing resources are becoming the predominant architecture for enterprises today. As you go through the motions of your day-to-day life, you are most likely ...
CCoE Kubernetes Virtana CrowdStrike cloud native

We Know Cloud-Native. What’s Cloud-Next?

Seven years after the phrase first emerged, cloud-native is the desired destination for the majority of organizations embarking on a digital transformation journey. But seven years is a lifetime in technology and ...
cloud-native migration open source Red Hat Windows

Why Cloud-Native Companies Should Support Open Source

Open source software (OSS) makes up the bedrock of our digital lives. And naturally, OSS is the foundation for most modern cloud-native infrastructure. In fact, a recent report from CNCF found a ...
CloudBees Appgate AWS Fargate

Appgate Extends SDP Reach to Kubernetes

Appgate’s software-defined perimeter (SDP) that controls access to IT platforms now includes support for Kubernetes clusters. Jason Garbis, chief product officer at Appgate, says the Appgate SDP extends a framework for creating ...
Kubernetes KSPM cloud-native Fugue security

Cloud-Native Security Posture Management

Lightspin CEO Vladi Sandler talks with Mike Vizard about how cloud security posture management (CSPM) is challenging in cloud-native computing environments. The video is below followed by a transcript of the conversation ...
HUB Security Adds Docker Security to Encryption Platform

HUB Security Adds Docker Security to Encryption Platform

HUB Security has added a Docker Digital Twin platform that secures, authenticates and verifies traffic created by Docker containers running on an encrypted hardware platform. Noam Dror, vice president for worldwide solution ...
cloud-native PCI Compliance in a Container Environment

Going Cloud-Native in Highly Regulated Industries

IT divisions working within highly-regulated industries are under intense scrutiny. These environments must carefully deal with sensitive data to meet compliances and corporate standards. This pressure often results in vigorous tooling assessments ...
cloud-native open source Cruise Kubernetes

CNCF: 80% of Orgs Want Open Source Cloud-Native Security

Open source software is now essential for driving digital innovation. And arguably, the cloud-native space wouldn’t exist without it — open source software (OSS) is now ubiquitous throughout all aspects of cloud-native ...
Sysdig Snyk container observability cloud-native Kubernetes

What Holistic Cloud-Native Security and Observability Look Like

The rise of cloud-native and containerization, along with the automation of the CI/CD pipeline, introduced fundamental changes to existing application development, deployment, and security paradigms. Because cloud-native is so different from traditional ...
ZTA trust authentication service mesh

Using Service Mesh to Enable Zero-Trust Architecture (ZTA)

Cybersecurity is not only a threat to private enterprises, it’s a national government priority, too. A 2021 presidential executive order names zero-trust architecture (ZTA) as part of new cybersecurity initiatives across government ...