PinnedTransitioning back to an individual contributor roleAs they say- Change is the only constant in life.Mar 14, 2022A response icon1Mar 14, 2022A response icon1
Runtime Debugging in Confidential Containers via Ephemeral ContainersIn the Confidential Containers (CoCo) trust model, the cluster administrator is untrusted. Consequently, debugging applications using…Nov 3Nov 3
Confidential Computing: Strengthening SaaS and Enterprise Security for Kubernetes clustersTraditional computing environments present a persistent challenge to data security: the potential for insider threats via compromised…Aug 19Aug 19
Best practices for running Build Pipelines in OpenShift sandboxed containersIn this blog, I’ll list some of the best practices when running build pipelines in Red Hat OpenShift sandboxed containers (OSC) based on…May 17May 17
Kubernetes and Zero Trust: Enhancing Security with CNCF Confidential ContainersZero Trust is a security strategy based on the following key principles:Apr 1Apr 1
Rethinking the Kubernetes pod-and-node relationship for AI workloadsExtend Kubernetes pods to external environments without re-architecting your stackMar 18Mar 18
Dynamic Kubernetes Scaling Across Environments Without Worker Node or Multi-cluster OverheadExtend Horizontal and Vertical Pod Autoscaler beyond the clusterMar 12Mar 12
Published inITNEXTSecuring Kubernetes Workloads: A Practical Approach to Signed and Encrypted Container Images-IIPodman — one tool to rule them allMar 4Mar 4
Enforcing Security in Confidential Containers with Kata Agent PoliciesHow to control Pod execution inside a TEEFeb 27A response icon1Feb 27A response icon1