Snyk and Shift-Left approach: Boosting your security compliance with ease. This article will provide a brief overview, some example use cases on Snyk's tools and features, and how we used it to improve Kubernetes Fury Distribution's security.
Conjur CyberArk Security Bulletin CA23-01, is your Conjur environment affected? What happened? Yesterday CyberArk published the security bulletin CA23-01 related to a critical vulnerability of the Rake ruby package, described in the CVE-2022-30123 . The vulnerability could be used remotely and allow a shell escape within the Conjur leader container. This issue only affects Conjur Enterprise. Containers of Conjur products other
Cloudnative PromCon EU 2022: Our highlights As our company sponsored PromCon EU 2022 and a delegation of us had the chance to attend the conference, we decided to share an event wrap-up.
announcements Featured SIGHUP Announces New Partnership with Snyk SIGHUP announces its Partnership with Snyk. Joining the forces together, these two companies aim to speed up developer security and DevSecOps best practice adoption.
Conjur Secrets manager? Yes please! Some insight about CyberArk Conjur In the last years, an explosion of human and not human identities has changed our corporations. Cloud workloads need to be identified and granted in the correct way. CyberArk Conjur, together SIGHUP expertise can solve these needs in the right way.
announcements Traent and SIGHUP launch a partnership to dramatically reduce the time-to-value for blockchain applications and solutions SIGHUP has joined Traent Partner Program, to increase and accelerate the adoption of scalable and enterprise-ready blockchain solutions.
How can you make your Cloud Native journey effortless? SIGHUP & Mia-Platform have joined forces to build a Zero Effort Cloud Native Journey.
Kubernetes How to run untrusted containers in Kubernetes The IT world is adopting container-based infrastructures more and more every day. However, the advantages, disadvantages and even the limitations are not clear to everyone.
training SIGHUP Kubernetes Training: Kubernetes for Application Developers Do you want to deepen your knowledge of Kubernetes and get ready for the Linux Foundation Official Certifications? Our training classes will guide you on your path to the certification, helping you grow your skills and providing best practices for the exams.
conference SIGHUP at KubeCon + CloudNativeCon Europe 2022 We will be a Silver Sponsor of this edition, and we cannot wait to meet you at booth S56 (Pavilion 2) in the vibrant city of Valencia from 18–20 May 2022.
Security Awesome CKS – Tips and tricks Preparing for a certification exam is always challenging. You have to retrieve the material to study, the exercises, and above all, to have a suitable environment to practice.
Kubernetes KFD guidelines for 2022 and the road ahead Find out more on the KFD guidelines for 2022 and what is coming next. Exciting times are ahead!
direnv How to manage multiple CLI tool versions with ease: direnv + asdf on macOS A helpful guide to setup direnv + asdf on macOS and bring order to versioning chaos
Cyberark Managing Kubernetes secrets with CyberArk Conjur We will explore the different strategies available to access Conjur secrets in Kubernetes and which use case they solve.
Kubernetes How to run Kubernetes without Docker Sooner or later this moment had to come, and it finally has: Kubernetes is deprecating Docker as a Container Runtime Interface in favor of the other supported runtimes. Let's try to explain why Docker seems really replaceable.
Engineering Announcing Gatekeeper Policy Manager v0.5.0 We are excited to announce a new release of Gatekeeper Policy Manager (GPM), our open-source web UI to easily manage OPA Gatekeeper and your policies inside Kubernetes Clusters.
Java A journey of migration: Java applications on Kubernetes Your journey to migrate Java applications from standard systems, such as physical or virtual machines, to a Kubernetes cluster is full of threats. Here you can find some guidelines to follow if you want to avoid the main dangers and make the trip as safe as possible.
GitOps How adopting GitOps made our lives easier GitOps is a buzzword, but it's also a concept which simply just works. In this article, I'll share the story of how and why it worked for my Kubernetes Infrastructure team.
GitOps Keeping Kubernetes Secrets secret in Flux Managing Secrets is a tough challenge in GitOps. This article explores how Bitnami Sealed Secrets can be used to handle your Kubernetes Secrets in a Flux workflow.
Engineering Scale workloads with Ingress traffic! Managing clusters and helping companies on their journey towards Kubernetes always creates new possibilities. One of the most exploited ones is the autoscaling capabilities that Kubernetes provides.
Engineering Gatekeeper Policy Manager turns 1 year old! Let's recap together all the improvements done in the first year of Gatekeeper Policy Manager
Secrets? It is one of the most controversial topics when you start playing around with Kubernetes: Secrets are not secrets. You probably hear about them as an "encrypted" alternative to the ConfigMaps. But are they "encrypted"?
Fury Tenaris Data Science - Customer Success Story SIGHUP and Tenaris Data Science Lab worked together to scale infrastructure and enhance productivity with Kubernetes Fury Distribution (KFD). Learn Tenaris customer success journey and how they leveraged Kubernetes Fury to automate applications management and training ML models with JupyterHub.
Kubernetes Featured Another brick in the SIGHUP Cloud-Native Stack: Introducing the Certified Container Images (CCI) SIGHUP is happy to introduce Certified Container Images (CCI): a secured and supported catalog of cloud native docker images to run your containerised workloads with confidence by SIGHUP
Kubernetes Featured Hierarchical Namespace Controller (HNC): a look into the future of Kubernetes Multitenancy Hierarchical Namespace Controller (HNC) is bringing a better multi-tenancy model to Kubernetes. In this article we are exploring the current state of the project and useful use-cases.