Anthropic’s October research showing an AI model reproducing a real intrusion drew mixed reactions. Some questioned the framing and others questioned the intent, but most platform teams did not find the result surprising. Many are already expecting a significant security adjustment as AI workloads grow. AI systems are scaling faster than the security properties of … continue reading
Containerization and virtualization are transformative technologies, each with unique strengths. When combined, they unlock unparalleled potential for edge environments, enabling businesses to achieve greater efficiency, resilience, and scalability. To better understand their unique strengths, Rudy de Anda, head of strategic alliances at Penguin Solutions, explains their complementary roles. Virtual machines (VMs) are good when it … continue reading
In today’s rapidly evolving technological landscape, organizations are constantly seeking ways to optimize their infrastructure for running applications. This often leads to the creation of vertical silos across departments, each with its own compute and application solutions. For instance, a quality control team might deploy an infrastructure to monitor and control quality, while cybersecurity, manufacturing … continue reading
Many infrastructure teams default to “put everything in containers.” Kubernetes makes it simple to deploy and manage services at scale, so databases often get pulled along for the ride. However, databases aren’t just another microservice. They rely on predictable performance from CPU, memory, storage, and networking – and containers can get in the way of … continue reading
Edera, provider of a secure-by-design Kubernetes and AI solution, today announced the availability of Am I Isolated, an open-source container security benchmark that probes users runtime environments and tests for container isolation. The Rust-based container runtime scanner runs as a container and detects gaps in users’ container runtime isolation. It also provides guidance to improve … continue reading
Octopus Deploy has recently launched new features to help simplify Kubernetes continuous delivery at scale. “Kubernetes is powerful but gets complicated when deploying hundreds or thousands of applications,” Colin Bowern, SVP of Product at Octopus Deploy, said in the company’s announcement. “Challenges like managing environments, lack of pipeline visibility, and compliance get more complex at … continue reading
Red Hat has announced the release of Red Hat Enterprise Linux (RHEL) 9.3, with Red Hat Enterprise Linux 8.9 coming in the next few weeks. These releases include updates designed to support containers, including an expansion of the Podman integration already present in RHEL. Podman is a tool for deploying, running, building, and sharing Linux … continue reading
Cilium provides eBPF-based networking, observability, and security for container workloads. It enables users to secure network connectivity between application services deployed using Linux container management platforms like Kubernetes. Cilium is built upon a Linux kernel technology known as eBPF. This technology allows for the real-time integration of robust security, visibility, and network control logic directly … continue reading
The application security company Mend.io is working to make containers more secure with the release of Mend for Containers, which scans container images and registries. According to the company, the new solution will enable DevSecOps teams to discover threats before they make it to production. It also can scan containers that are already in production. … continue reading
Workloads are the workhorses of your mission-critical applications—they’re what get the job done. The environments that these workloads run in, and the way we manage them, have evolved significantly. Back in the old days, applications were built as monoliths. They were self-contained systems that included not just the capabilities you needed them for but also … continue reading
44% of organizations stated that they are already using containers for almost all of their applications and business segments while another 35% reported that containers are used for at least a few production applications. This is according to the CNCF Annual Survey 2022, conducted by the Cloud Native Computing Foundation (CNCF) and Linux Research Foundation. … continue reading
The cloud native guide is a listing of cloud-native security tool providers, along with a brief description of their offerings. … continue reading