phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

15 Point Kubernetes Security Checklist

Thoroughly securing containers and Kubernetes environments – especially in production where they’re most vulnerable – requires a layered security strategy with consistent vigilance across multiple fronts. Kubernetes itself has become an increasingly ...
Konveyor Loft Labs Ubuntu

Red Hat, IBM Launch Konveyor to Aggregate Kubernetes Tools

At the online KubeCon + CloudNativeCon Europe 2021 event today Red Hat and IBM Research announced they are teaming up to create a Konveyor to advance adoption of a collection of tools ...
AIOps Virtana AWS StormForge microservices MLMD machine learning MLOps

Modernizing Legacy Applications: Technical Lessons

This is part two of lessons learned from modernizing legacy applications to a microservices architecture. You can check out part one here. Part one focused on organizational lessons learned. This segment is ...
software Tanzu clusters Nexus VMware Microservices Containers App Architecture Revolution

When Microservices Fall Short

Microservices principles are used to decouple different business domains through a bounded context. We can develop microservices independently to benefit from polygot architecture. But microservices architecture is not completely able to solve ...
zero-trust services cloud-native permissions CNCF SOA vs. Microservices Monitoring

Lessons in Legacy to Microservices Modernization

Modernizing legacy applications to a microservices architecture is very different from starting from scratch on a greenfield new application project. Large companies typically have working software that spans decades, and the challenges ...
The Double-Edged Sword of Kubernetes

The Double-Edged Sword of Kubernetes

Developing and operating distributed architectures is complex and tedious. Over the past decade, many orchstration technologies helped bring the development environment closer to the actual deployment system to simplify development. As you’re ...
Kubernetes, developer platform Docker cloud-native applications Anchore SBOM metrics full cycle complexity software development

The Biggest Enemy in a Software-Defined World: Complexity

Ten years ago this August, Marc Andreessen made his famous declaration that “software is eating the world.” In the decade since, the “dramatic and broad technological and economic shift” that Andreessen illuminated ...
Kubernetes cloud waste ArcGIS Cloud-native Tetrate

10 Steps to Reduce Cloud Waste

Industry pundits confirm that cloud computing has not only gone mainstream, but also that nearly all organizations are following the trend. For example, according to recent research, more than 90% of all organizations ...
Honeycomb Buoyant Solo.io CNCF Linkerd Istio service mesh

Service Mesh Extensibility Explained

Have you ever wondered how to extend your service mesh for your specific business needs? Perhaps you need to add external authorization or advanced rate-limiting? Or maybe you want to add custom ...
Microservices: A Welcome Disruption

Microservices: A Welcome Disruption

Much is discussed about Kubernetes and containers, but the real benefit of this platform comes in the form of microservices—small, independently deployed functions that will define digital transformation. Microservices give us the ...