New Year, Better StackRox: Extending Our Lead in Kubernetes-Native Security

New Year, Better StackRox: Extending Our Lead in Kubernetes-Native Security

StackRox is continuing to shape the future of Kubernetes by enabling customers to build, deploy and run cloud-native applications at scale securely. In recent months, we have released several new, important features covered in this post, focusing on enhanced detection capabilities and simplified administrative workflows. This focus drove new protections ... Read More
Kubernetes Namespaces Demystified - How To Make The Most of Them

Kubernetes Namespaces Demystified – How To Make The Most of Them

Kubernetes namespaces are a central part of how we structure, deploy, and manage containers today. However, namespaces are not a new concept; in fact, Linux namespaces were introduced in 2002 and designed to separate and group individual processes and capabilities. So how did the idea grow to be used in ... Read More
Top Kubernetes Certifications and Why They Matter

Top Kubernetes Certifications and Why They Matter

Why Kubernetes? When containers first broke onto the scene, it was immediately apparent that it was a disruptive technology. What was not clear was how containers were going to be scaled and orchestrated effectively. In the early days, the container orchestration competition was intense, with applications such as Docker Swarm, ... Read More
Demystifying DevSecOps - Everything You Must Know to Get it Right

Demystifying DevSecOps – Everything You Must Know to Get it Right

The rapid emergence of modern software development initiatives, public cloud services, and cloud-native tools such as Kubernetes and containers has accelerated the seminal move towards DevOps practices. DevOps has come to reflect a culture that champions principles such as increased collaboration, shared responsibility between engineering teams that spans development and ... Read More
DevOps vs. DevSecOps - Here’s How They Fit Together

DevOps vs. DevSecOps – Here’s How They Fit Together

DevOps, DevSecOps, shift-left, security posture, cloud native, etc. Chances are you’ve heard these terms or similar buzzwords when discussing modern application development life cycles. These new industry words can be beneficial – by providing a framework that explains complex processes – or harmful through misuse or overuse. Whether misuse is ... Read More
What is KubeLinter?

What is KubeLinter?

What is KubeLinter? The KubeLinter is an open-source command-line interface to identify misconfigurations in Kubernetes objects. KubeLinter offers the ability to integrate checks on Kubernetes YAML files and Helm charts before deployment into a Kubernetes cluster. With 19 standard built-in checks and the room to configure your own, you get ... Read More
Part 4 - Rancher Kubernetes Engine (RKE) Security Best Practice for Cluster Maintenance and Network Security

Part 4 – Rancher Kubernetes Engine (RKE) Security Best Practice for Cluster Maintenance and Network Security

Rancher Kubernetes Engine (RKE) Security Best Practice for Cluster Maintenance and Network Security This is the last installment in our four-part RKE security blog series. Don’t forget to get caught up on everything you missed! Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup Part 2 ... Read More
Part 3 - Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security

Part 3 – Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security

Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security This is the third installment in our four-part RKE security blog series. Don’t forget to follow along to our upcoming posts and get caught up on everything you missed! Part 1 - Rancher Kubernetes Engine (RKE) Security Best ... Read More
Part 2 - Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access

Part 2 – Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access

Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access This is the second installment in our four-part RKE security blog series. Don’t forget to follow along to our upcoming posts in the series: Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup ... Read More
Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup

Part 1 – Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup

Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup This is the first installment in our four-part RKE security blog series. Don’t forget to follow along to our upcoming posts in the series: Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup Part 2 - ... Read More