Compliance is NOT Security

The Problem with Security and Compliance Mixture When talking to customers or colleagues, I often see two distinct topics being conflated: Compliance and (IT-) Security. Some customers have requirements they say MUST be fulfilled. When asked what their goal with this requirement is, they cannot elaborate the intention. They often fall back into saying that […]

Forensic container checkpointing in OpenShift

Photo by Daniel van den Berg on Unsplash On a warm summer day, I visited the Kubernetes Community Days Munich and enjoyed Adrian Reber’s talk about “Forensic container checkpointing and analysis”. Now I want to try that with OpenShift 4.13! This blog post will mainly cover how to enable and use checkpointing on OpenShift 4.13. […]

Automatically update containers with podman-auto-update

Photo by Timelab on Unsplash In this tutorial I will show you how to configure automatic updates for containers in rootless Podman environments and how systemd manages these containers as services. The tutorial is divided into the following sections: If you are not interested in the possible use cases and would rather start right away, […]

Patterns – A Path Towards Hybrid Cloud

ˈpætɚns Probably almost every time we are starting to understand and to solve a general problem, we will ask ourselves, am I the first one who is facing that problem, or have there been others who in the end either failed or succeeded. This is particularly true, if I am highly uncertain whether my own […]

Software Supply Chain Security

What is Software Supply Chain Security ? In this day and age most of us are looking for trust and security. This is also true for our IT infrastructure as challenges from the outside grow more and more dangerous to the continuation of undisturbed business. Attacks on the IT infrastructure of companies not only rise […]

Building Trust in the Software Supply Chain

Overview What steps can we take to establish trust in our Software Supply Chain and ensure that our software can be traced back to its origin without introducing malicious code or dependencies? Moreover, how can we integrate Open Source tools to enhance the security of our Software Supply Chain’s lifecycle? As we explained in our […]

Approaching the Kubernetes Bridge – Multi-container Apps with Rootless Podman

In the year 2023 we celebrate the 10th anniversary of Docker and the 9th anniversary of Kubernetes. Container technology has now become mainstream. But recent advances in the Podman ecosystem prove that innovation in the container world is still happening at a strong pace. Podman 4 was released in February 2022 and brought considerable improvements […]

A little bit of security is what I want

A quick tour of how a Kubernetes Management Platform like Red Hat OpenShift can help to ease developers day to day work and ensure security at the same time

You’ve written a Kubernetes-native Application? Here is how OpenShift helps you to run, develop, build and deliver it – securely! (1/4)

This blog kicks off a series of 4 blog articles. They will all be available here, as soon as they get published. Run: Get your Angular, Python or Java Dockerfile ready with Red Hat’s Universal Base Image and deploy with Helm on OpenShift Develop: The Inner Loop with OpenShift Dev Spaces Build: From upstream Tekton […]

Optimizing a systemd service for security

First of all: What is a systemd service ? systemd is an init system in the Linux world, similar but not identical to init or SysVinit init systems (see [8]). There has been much discussion about this, but in the end all major distributions have for some time now switched to systemd. Essentially, systemd moves […]

%d bloggers like this:
close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.