Nathan Eddy, Author at Cloud Native Now https://cloudnativenow.com/author/nathan-eddy/ Thu, 30 Jan 2025 09:08:01 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://cloudnativenow.com/wp-content/uploads/2023/04/cropped-CCn-bug--32x32.png Nathan Eddy, Author at Cloud Native Now https://cloudnativenow.com/author/nathan-eddy/ 32 32 94898820 Gaia-X Tellus Enables Automated Network Access for Cloud Environments  https://cloudnativenow.com/features/gaia-x-tellus-enables-automated-network-access-for-cloud-environments/?utm_source=rss&utm_medium=rss&utm_campaign=gaia-x-tellus-enables-automated-network-access-for-cloud-environments Thu, 30 Jan 2025 09:06:25 +0000 https://cloudnativenow.com/?p=160276 Tellus, cloud, environments, private clouds, TFD, Nuon, SaaS

Tellus, cloud, environments, private clouds, TFD, Nuon, SaaS

The Gaia-X Project Tellus has completed its implementation phase, delivering a fully automated prototype for interconnecting cloud environments across multiple providers. 

The post Gaia-X Tellus Enables Automated Network Access for Cloud Environments  appeared first on Cloud Native Now.

]]>
160276
Container Adoption Comes with Risks for Software Supply Chain https://cloudnativenow.com/features/container-adoption-comes-with-risks-for-software-supply-chain/?utm_source=rss&utm_medium=rss&utm_campaign=container-adoption-comes-with-risks-for-software-supply-chain Wed, 11 Dec 2024 15:01:26 +0000 https://cloudnativenow.com/?p=160040 Docker, vulnerabilities, supply chain, KubeCon, SigStore, Kubernetes TrapX container security

Docker, vulnerabilities, supply chain, KubeCon, SigStore, Kubernetes TrapX container security

Multiple critical vulnerabilities and risks have been found lurking within some of the most commonly downloaded Docker Hub container images. The NetRise study examined 70 randomly selected images from the top 250 downloads, uncovering an average of 604 known vulnerabilities per container, with more than 45% dating back 2 to

The post Container Adoption Comes with Risks for Software Supply Chain appeared first on Cloud Native Now.

]]>
160040
Kubernetes Environments Grow in Complexity, Challenging Ops Teams https://cloudnativenow.com/features/kubernetes-environments-grow-in-complexity-challenging-ops-teams/?utm_source=rss&utm_medium=rss&utm_campaign=kubernetes-environments-grow-in-complexity-challenging-ops-teams Wed, 15 Nov 2023 13:00:04 +0000 https://cloudnativenow.com/?p=157661 complexity Kubernetes Kafka

complexity Kubernetes Kafka

As Kubernetes becomes increasingly complex, operations (Ops) teams are finding it challenging to manage their clusters effectively.

The post Kubernetes Environments Grow in Complexity, Challenging Ops Teams appeared first on Cloud Native Now.

]]>
157661
Overprovisioning of Containerized Applications Adds to Cloud Costs  https://cloudnativenow.com/features/overprovisioning-of-containerized-applications-adds-to-cloud-costs/?utm_source=rss&utm_medium=rss&utm_campaign=overprovisioning-of-containerized-applications-adds-to-cloud-costs Fri, 16 Dec 2022 13:00:01 +0000 https://cloudnativenow.com/?p=154529 PerfectScale Rafay Systems Kubecost Granulate Platform9 Kubernetes Cost Controls

PerfectScale Rafay Systems Kubecost Granulate Platform9 Kubernetes Cost Controls

Organizations are struggling with cloud cost management for Kubernetes, with the inability to scale back once application demand drops as one of the major drivers of wasted cloud spending. This was one of the chief findings of a CAST AI report providing insight into overprovisioning of resources, overspending on cloud

The post Overprovisioning of Containerized Applications Adds to Cloud Costs  appeared first on Cloud Native Now.

]]>
154529
Linux Kernel Bug Allows Kubernetes Container Escape https://cloudnativenow.com/features/linux-kernel-bug-allows-kubernetes-container-escape/?utm_source=rss&utm_medium=rss&utm_campaign=linux-kernel-bug-allows-kubernetes-container-escape Mon, 31 Jan 2022 15:27:28 +0000 https://cloudnativenow.com/?p=16792 container security

container security

Hackers could exploit a Linux kernel bug to escape Kubernetes containers and access critical resources; however, the threat is minimized as any attacker needs to have the specific Linux capability CAP_SYS_ADMIN. The high-severity Common Vulnerabilities and Exposures (CVE) 2022-0185, first reported by security publication BleepingComputer, affects all Linux kernel versions

The post Linux Kernel Bug Allows Kubernetes Container Escape appeared first on Cloud Native Now.

]]>
16792
Kubernetes Users See Serverless Future https://cloudnativenow.com/features/kubernetes-users-see-serverless-future/?utm_source=rss&utm_medium=rss&utm_campaign=kubernetes-users-see-serverless-future Fri, 27 Aug 2021 06:00:36 +0000 https://cloudnativenow.com/?p=15286 StackGen, Argo, IaC, IaC code, AI, GenAI, Quali OutSystems Spectro Cloud IaC Kubernetes audit

StackGen, Argo, IaC, IaC code, AI, GenAI, Quali OutSystems Spectro Cloud IaC Kubernetes audit

As a growing number of organizations deploy services and applications on Kubernetes, hybrid and multi-cloud environments are also seeing increased rates of adoption as well as an interest in serverless technology. A survey of 200 organizations in the U.S., commissioned by Cockroach Labs and Red Hat, finds nearly half (46%)

The post Kubernetes Users See Serverless Future appeared first on Cloud Native Now.

]]>
15286
Misconfigured Argo Workflows Expose K8s to Attack https://cloudnativenow.com/editorial-calendar/misconfigured-argo-workflows-expose-k8s-to-attack/?utm_source=rss&utm_medium=rss&utm_campaign=misconfigured-argo-workflows-expose-k8s-to-attack Fri, 23 Jul 2021 06:00:21 +0000 https://cloudnativenow.com/?p=14997 JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

With the use of Kubernetes growing rapidly among enterprises comes increased opportunities for attackers to exploit the popular container orchestration platform’s weaknesses in security. This week, security specialist Intezer has detected a new attack vector against K8 clusters through misconfigured Argo Workflows instances and is warning of the potential for

The post Misconfigured Argo Workflows Expose K8s to Attack appeared first on Cloud Native Now.

]]>
14997