What are Linux containers?
Over the last decade, containers have become an essential part of running infrastructure more efficiently. Containers enable productivity, automation, and cost-effective deployments. But there are different types of containers to consider, and this blog explains what Linux containers are, and how they differ from application containers.
Updated: Kubernetes Hardening Guide | CISA [Ed: Taking security advice from the NSA? Well, if they want us to use Kubernetes, then maybe Kubernetes does not exactly enhance security (or worse yet -- it undermines it)]
The National Security Agency (NSA) and CISA have updated their joint Cybersecurity Technical Report (CTR): Kubernetes Hardening Guide, originally released in August 2021, based on valuable feedback and inputs from the cybersecurity community.
New on-demand class: Secure the Edge with K3s and Traefik Proxy
On February 8, Robert Sirchia and I taught a Master Class for the SUSE and Rancher Community that explained how to use K3s with Traefik Proxy.
↧
Containers and Kubernetes: Canonical. NSA, and SUSE
↧