Developers need to make a Kubernetes security hardening a priority before you dabble with Jenkins X in your environment. Don't let Kubernetes vulnerabilities expose your valuable data to possible attacks.
Containers are a very big deal in enterprise computing right now. Here, we'll look at the individual components used in the showcase and how each could be used by a cyber security team to replicate the work done at Interop.
Cloud native models using containerized software in a continuous delivery approach could benefit from serverless computing where the cloud vendor generates the exact amount of resources required to run a workload on the fly. While the major cloud vendors have recognized this and are already creating products to abstract away the infrastructure, it may not […]