Ten years after the zero trust security model was first articulated, organizations are doubling down – but successful defense also means reassessing your approach to operating the cloud.
A decade ago, Forrester Research analyst John Kindervag called time on perimeter security and warned us against trusting the traffic on our corporate networks…
Securing the infrastructure, platforms, processes and data is one of the most important topics in cloud computing. the cloud report interviewed cloud security experts about the challenging year 2020, how this year of digitization affected cloud security, and their expectations and solutions for 2021.
read the interview here
Container technology received a lot of attention recently and has become essential for cloud native deployments. However, all that glitters is not gold and the technology has a few drawbacks. The Cloud Native Computing Foundation identified within their most recent surveys the limitations within the areas of storage and security. The following article describes how to deal with persistent storage requirements in hybrid cloud environments. Furthermore, it describes possible solutions by taking advantage of dynamic storage orchestrators such as Trident and its related architecture.
The last year has influenced many things, and we have noticed it most in our professional lives in the way we work together. We are now used to communicate and work via a screen and shared resources. But for a large part of the IT world, this was not new – the open source communities…
An interview with Amith Nair
Around the time of KubeCon & CloudNativeCon Virtual 2020 the cloud report had the opportunity to talk with Amith Nair, Vice President Product Marketing at HashiCorp, about automation, what a company can do for cloud-native development and get to the heart of open source.
Read the interview here
Here you get all information about the latest VanillaStack release, what is new, what changed, what happend in the project, how they use the newest Stratos version, …
In this interview Andreas Weiss from the Gaia-X project management eco explains what Gaia-X really is about! No hyperscaler or European cloud, but an initiative to gain real data sovereignty in a secure, federative, open source data infrastructure. And of course, Gaia-X is way more, it is “a once in a lifetime achievement” and a great opportunity for Europe to take the different way and live our diversity.
Berlin based company Cloudical is offering a webinar series to introduce and discuss the LPIC 303 security certificate. It is important to secure the all underlying Linux to build a secure cloud environment. And the both experts are explaining step by step the parts of the certificate. Learn here what you can expect.
On Wednesday, the 27th of January the kick-off webinar for a Cloud Expo Gaia X series during the year 2021 started. These events discuss the idea of Gaia X, the status of the project, introduce the participants and invite more to join this pioneer initiative.
News from the VanillaStack project, two maintainers talk about community´s and customer´s feedback, about changes and bug fixes, about an evolving project, decission making and a from the CNCF Cetified Kuberntes project.
Find more details about the VanillaStack here
Out Now: The Cloud Report issue 4/2020
One of GAIA-X’s main goals is to restore data sovereignty in Europe when using cloud technology. US hyperscalers, for example, are subject to the US Cloud Act, which enables US authorities to enforce the release of data stored in data centers in Europe. This is contrary to European law and the GDPR. At the beginning of 2019 it was still being considered to build a European hyperscaler, but it was finally decided to create solutions with standards that would give European users more sovereignty.
Nowadays cloud is everywhere, cloud is important to many enterprises – and for good reason! With cloud approaches, one gets the benefit of understanding resources as pool, which allows utilizing them according to the currently given needs.
But cloud is complex, especially, if you want to be in control: You need to set up your infrastructure, you need to automate it, you need to maintain it, you need to learn many things.
One of Polyverse´ offering is the Polymorphing. In this interview Archis tells us what the Polymorphing does (fancy things!) and Jurlind explaines why and how it is integrated in the VanillaStack. But first of all it is about cloud security, collaboration, open source and open minset!
The Coronavirus is wreaking havoc on everything in our lives. It’s hard to find something that hasn’t been impacted in a major way as we attempt to limit the spread of the virus. Cloud security professionals should pay close attention to how our online needs are rapidly changing — these new adjustments are more than just necessary to make things work in the interim. The workarounds to keep our lives as normal as possible could permanently define the way we work, study, and do business from here on out.
Kubernetes is an opensource platform for automating deployment, scaling, and management of containerized applications. According to the data from GitHub, Kubernetes represents one of the largest opensource projects worldwide, and the development and deployment of tools around Kubernetes is rapidly and continuously growing. This rapid and continuous evolution makes Kubernetes an unsteady, fastmoving target, in particular regarding security.
Last week Dan Kohn, the former executive director at Cloud Native Computing Foundation (CNCF), died quite to early as a result of colon cancer.
We thank him for his long-term engagement for open source, for boundless collaboration and the Public Health Initiative of the Linux Foundation and his former dedication in several organizations and foundations.
By enabling a long-held dream of computing as utility, Cloud Computing has become one of the major technology trends in the last decade. Due to its’ flexible and agile nature, Cloud Computing is continuously and significantly transforming a large part of the IT industry.
Clouds are replacing traditional corporate data centers. More and more companies are connecting the computing power of external providers instead of managing their own pool of physical servers.
Why do successful businesses move to clouds? Short answer: to cut costs and speed up growth. In more detail, let’s consider the main factors that push businesses to move to cloud services and the arguments in favor of the cloud.
Over the past 18 months, containers have taken most organizations by storm. Containers and microservices are key enablers in organisations’ quests for digital transformation. But, they increasingly need to adopt a smart cloud security strategy based around a Container Security Triad.
The OpenStack Foundation’s virtual OpenDev event this summer created a space for engaging conversations on a variety of topics within the open infrastructure community. Packaged into three separate events, each three days in duration, participants discussed open infrastructure software, hardware automation and containers in production. In the first session, Blizzard Entertainment, Verizon, and OpenInfra Labs discussed combatting the challenges behind scaling, testing and integration during their presentations to the open source community.
Cloud computing has long been the way to go for digital-savvy business owners, but the current health crisis has accelerated the need for all businesses to adopt a flexible, cloud-first framework. Adopting the right technology helps keep your business agile while ensuring that employees stay productive. This article outlines how cloud computing and employee productivity are closely linked, with a focus on tighter security protocols, the creation of efficient workflows, and scalability.
The following article describes an example of how a real-world “As A Service”-infrastructure was designed and deployed from scratch. It covers different aspects of running multiple assets in form of service offerings, e.g. virtual machines, containers or microservices. Therefore, EWERK describes their journey from a blank page to production and how they solved challenges like scalability, reliability and performance. This is meant for everyone who wants to understand platform design principles and what to consider before getting started as well as after take-off.
In an era of transformation, speed and agility of application infrastructure is key
Unfortunately, it can take IT weeks to deliver new application stacks when requested because of manual hand-offs across a fragmented set of ‘software-definable’ technologies on-premises. This inefficiency leads teams to bypass IT in favor of public cloud application services which raises cloud costs and opens security holes.
The cloud report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The fives interview was with Simon Pearce, Product Owner and Team Lead at SysEleven.
Read the interview here
The cloud report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The fourth interview was with Brent Schroeder, CTO of SUSE
Read the interview here
The cloud report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The third interview was with Markus Eisele, Developer Adoption Program Lead EMEA, Red Hat
Read the interview here
The cloud report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The second interview was with Hendrik Land, Solutions Architect at NetApp.
Read the interview here
The Cloud Report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The first interview was with Julian Hansert, COO at Kubermatic.
Read the interview here
If you are willing to accelerate your cloud business, you will most likely be looking at setting up automated pipelines and on automating at least parts of your operations. What if I told you this already exists – and it frees you from handling it yourself?
Interested? Read on!
Some time ago, I learned an important Kubernetes lesson the hard way. The story begins with Kubernetes Operators, which is a method of packaging, deploying, and managing a Kubernetes application. The thing I tripped up on was garbage collection in the cluster, which cleans up objects that no longer have an owner object (but more on that later)…
G-Core Labs has its own cloud infrastructure spanning 5 continents. Thousands of clients worldwide use G-Core Labs services. Such coverage allows G-Core Labs to both see the global picture and analyze data by region and country. Unlike previous years when we usually see a decrease in web activity at the end of winter, the situation this year was reversed. The highest traffic increase for April was observed in North America and Europe where total traffic consumption grew by 33 % and 18 %, respectively, during the pandemic. In Latin America, the network load increased by 12 % since the beginning of the year.
The topic of security can often be a difficult discussion at many companies. There are many competing demands to satisfy all at the same time. How do we increase developer productivity, satisfy regulatory requirements, ensure production stability, and detect and remediate threats in real time? The answer won’t be simple, but because of advances in cloud-based technology there are some thought processes that are quickly becoming outmoded.
How we could deal with changing situations
The current situation forces a lot of people, companies and other organizations to change their work processes, tools, collaboration models, and the mindset. Home-office and mostly virtual contacts not only affect the work situation, but also the mental conditions. I had the opportunity to talk to a mental and somatic coach who is dealing with all these aspects in her daily professional life:
Today the SUSECONdigital 2020 starts! Upfront the cloud report interviewed Melissa di Donato. Have a spectacular SUSECON.
SUSE prides itself as the largest independent open source company in the world. With the appointment of Melissa di Donato to CEO in August 2019, SUSE started a new chapter and put itself on the path to global growth. In this interview, Melissa explains how her style of leadership matches perfectly with the vision of open source, the role of women in tech leadership and how fierce collaboration inspires SUSE and its customers.
This article gives a short overview of the Gaia-X project as next generation cloud computing: with motivation for the project, what is Gaia-X?, project organization, role of civil society and prospects.
Interview with data journalist Sebastian Vollnhals
The first time I encountered a password was when my four years older sister tried to prevent me from entering her secret play bunk. Upsettingly enough she didn’t give the password to me and I was locked out. As an adult however, I use passwords every day for many purposes: logging into accounts, retrieving my emails, accessing applications, databases, networks, websites, and also my subscriptions. Moreover, this is the case for every typical computer user.
CI/CD stands for Continuous Integration / Continuous Delivery and depicts an approach where software is built and deployed whenever a check-in into a source code repository is executed. This allows for a central build process, central storage of generated artifacts and centrally executed tests. The idea sounds simple, understandable and obvious. But it isn’t, at least not from an executional point of view, since there is more to it in modern application- and cloud-native environments.
An Interview with Chip Childers
Chip Childers is the cofounder of the Cloud Foundry Foundation and has been its Chief Technology Officer since 2016, now he is the Executive Director of the Foundation. During his visit in Berlin, we had the opportunity to meet up with him and get insight into the organization. What are they up to and what is to come?
The need of more efficient and secure processes is growing steadily, both in present times and for the future. no kind of digitization, or even digitalization, can successfully be performed if processes are not defined. But why is the optimization of processes so critical, and why are we in need of secure processes for information security?