What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Kubernetes

Intel Innovation 2023: Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

The attestation service is designed to allow data in confidential computing environments to interact with AI safely, as well as provide policy enforcements and audits. Image: JHVEPhoto/Adobe Stock The second day of announcements at Intel’s Innovation event in San Jose, California focused on privacy and security, including confidential AI. Major . . . Read more

Top Container Management Tools

Container management tools offer developers isolated, portable, and consistent environments that can help them quickly develop, test, and deploy applications across a wide variety of platforms. This guide will break down the following top container management tools in terms of features, pros, cons, and pricing so you can pick the . . . Read more

VMware Explore 2023: Keynote Highlights

Explore enterprise applications and infrastructure, AI, tools for the remote workforce, machine learning, and more from VMware Explore 2023. Image: Adobe/apinan VMware made several announcements related to new cloud, edge and machine learning services on August 22 at VMware Explore held in Las Vegas. This includes services for accelerated ransomware . . . Read more

Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat. Image: sarayut_sy/Shutterstock Sysdig, a cloud and container security company, has released a new report on the Scarleteel threat that targets specific AWS environments . . . Read more

Cilium Mesh: A new way to extend Kubernetes benefits across on-premises and cloud networking

Image: Ar_TH/Adobe Stock Networking has long been the holdout in enterprise aspirations toward high-performance, multicloud or hybrid architectures. While such architectures were once aspirational marketing buzzwords, they are today’s enterprise reality. Now, with the launch of Cilium Mesh, enterprises get “a new universal networking layer to connect workloads and machines . . . Read more

Dell brings more cloud products under APEX umbrella

APEX Navigator for Kubernates and more join Dell’s hybrid and multicloud software-as-a-service family. Image: mrinal/Adobe Stock Dell reconfigured several of its multicloud and hybrid services under the APEX brand name as part of the suite of announcements at Dell Technologies World on May 22. The change is in response to . . . Read more

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat. Image: Pixabay The cybersecurity company CrowdStrike has observed the first-ever Dero cryptojacking campaign. The attack targets Kubernetes clusters that were accessible on the internet and allowed anonymous access to . . . Read more

Kubernetes is the key to cloud, but cost containment is critical

What’s driving the growth of open source container orchestrator Kubernetes? A study by Pepperdata shows how companies are using K8s and the challenges they face in getting a handle on cloud costs. Image: LuckyStep/Adobe Stock With the rush to cloud enterprise comes increasing use of Kubernetes to get applications up . . . Read more

How to easily deploy a full-stack application in Portainer with templates

Deploying a complex Docker stack isn’t nearly as challenging as you think, at least when Portainer is your GUI of choice. Find out how easy this is with Portainer templates. [embedded content] When you think of deploying a full-stack, containerized application, you probably expect it to be a tedious and . . . Read more

TeamTNT Gains Full Remote Takeover of Cloud Instances

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.