PinnedTransitioning back to an individual contributor roleAs they say- Change is the only constant in life.Mar 14, 20221Mar 14, 20221
Kubernetes and Zero Trust: Enhancing Security with CNCF Confidential ContainersZero Trust is a security strategy based on the following key principles:2d ago2d ago
Rethinking the Kubernetes pod-and-node relationship for AI workloadsExtend Kubernetes pods to external environments without re-architecting your stackMar 18Mar 18
Dynamic Kubernetes Scaling Across Environments Without Worker Node or Multi-cluster OverheadExtend Horizontal and Vertical Pod Autoscaler beyond the clusterMar 12Mar 12
Published inITNEXTSecuring Kubernetes Workloads: A Practical Approach to Signed and Encrypted Container Images-IIPodman — one tool to rule them allMar 4Mar 4
Enforcing Security in Confidential Containers with Kata Agent PoliciesHow to control Pod execution inside a TEEFeb 27Feb 27
Simplifying Confidential Computing: Sealed Secrets in ActionUsing CoCo sealed secrets to make it easier to adopt confidential computing for your Kubernetes workloadsDec 28, 2024Dec 28, 2024
Published inITNEXTSecuring Secrets in Confidential Containers: Usage patterns to avoidHow to Ensure Your Sensitive Data Remains Protected in MemoryAug 21, 2024Aug 21, 2024
Confidential Containers Attestation ImplementationFor developer’s eyes only :-)Jul 30, 20242Jul 30, 20242
Published inITNEXTHow your confidential containers can securely retrieve secrets?Handling secrets in confidential containersJul 5, 2024Jul 5, 2024