Interviews
The Big Interview: Jinhong Brejnholt, Chief Cloud Architect, Saxo
"We used Istio for our service mesh. Now we're using Linkerd. We are already considering..."
Interviews
"We used Istio for our service mesh. Now we're using Linkerd. We are already considering..."
Cloud
"The team followed what I consider to be best practice..."
Featured
Gaming heavyweight wants a quicker way to deploy new multiplayer games…
Cybersecurity
NCC Group audit puts the spotlight on API, permissions weaknesses.
Cybersecurity
A recent attack tracked by researchers at cloud security company Sysdig saw the attackers use an exposed Kubernetes container to move laterally to the victim’s AWS account – gaining initial access by exploiting a public-facing service in a self-managed Kubernetes cluster hosted inside an AWS cloud account. The company'
Featured
Sylva to provide solution to "edge/cloud continuum" challenges.
Cloud
A critical vulnerability in an Azure tool that lets users manage Kubernetes clusters can be exploited remotely without authentication to gain administrative control over Kubernetes clusters, as well as Azure edge devices. The vulnerability, allocated a maximum possible CVSS (severity rating) score of 10 has been allocated CVE-2022-37968. It is
Enterprise IT
Enterprise Linux specialist on Rancher, AWS partnership and more.
Featured
Canonical pulls update, as MS suggests rebooting affected VMs.
Cloud
Kubernetes Cluster Autoscaler needed some tweaking...
Enterprise IT
Here's why you should be paying attention...
Enterprise IT
Should you care? Quite possibly...