PinnedTransitioning back to an individual contributor roleAs they say- Change is the only constant in life.Mar 14, 2022A response icon1Mar 14, 2022A response icon1
Best practices for running Build Pipelines in OpenShift sandboxed containersIn this blog, I’ll list some of the best practices when running build pipelines in Red Hat OpenShift sandboxed containers (OSC) based on…May 17May 17
Kubernetes and Zero Trust: Enhancing Security with CNCF Confidential ContainersZero Trust is a security strategy based on the following key principles:Apr 1Apr 1
Rethinking the Kubernetes pod-and-node relationship for AI workloadsExtend Kubernetes pods to external environments without re-architecting your stackMar 18Mar 18
Dynamic Kubernetes Scaling Across Environments Without Worker Node or Multi-cluster OverheadExtend Horizontal and Vertical Pod Autoscaler beyond the clusterMar 12Mar 12
Published inITNEXTSecuring Kubernetes Workloads: A Practical Approach to Signed and Encrypted Container Images-IIPodman — one tool to rule them allMar 4Mar 4
Enforcing Security in Confidential Containers with Kata Agent PoliciesHow to control Pod execution inside a TEEFeb 27Feb 27
Simplifying Confidential Computing: Sealed Secrets in ActionUsing CoCo sealed secrets to make it easier to adopt confidential computing for your Kubernetes workloadsDec 28, 2024Dec 28, 2024
Published inITNEXTSecuring Secrets in Confidential Containers: Usage patterns to avoidHow to Ensure Your Sensitive Data Remains Protected in MemoryAug 21, 2024Aug 21, 2024
Confidential Containers Attestation ImplementationFor developer’s eyes only :-)Jul 30, 2024A response icon2Jul 30, 2024A response icon2