Other

Securing Platform Engineering with Multi-Tenancy and Micro-Segmentation

At KubeCon, Jim Bugwadia and Rachael Wonnacott, from Nirmata and Fidelity International, respectively, delivered a session focusing on platform engineering, multi-tenancy, and micro-segmentation. They discussed how these concepts contribute to secure and efficient platform engineering practices, aiming to reduce cognitive load for developers while maintaining…

0

5 Essential Policies to Implement in Your Kubernetes Cluster with Kyverno

In a recent session at KubeCon, Jim Bugwadia, co-founder of Nirmata and Kyverno maintainer, shared five must-have policies that Kubernetes administrators should consider using to enhance their cluster security and efficiency. Kyverno, a powerful policy-as-code solution, has been helping organizations streamline their policy enforcement with…

0

Enforcing Security & Operational Best Practices for AWS Bedrock with Nirmata

As organizations adopt AWS Bedrock for generative AI, maintaining governance, security, and efficiency becomes essential. Nirmata Control Hub enables teams to scan AWS Bedrock services and enforce compliance using declarative policies. By embedding policies directly into your workflows, you ensure that every model invocation, configuration,…

0

Securing OpenTofu (Infrastructure-as-Code) with Nirmata Powered by Kyverno

As Infrastructure as Code (IaC) continues to gain popularity among DevOps practitioners for its efficiency and scalability, the recent Terraform license ambiguity has prompted the emergence of alternative solutions. OpenTofu, marking its first stable release, enters the scene as a robust Infrastructure-as-Code tool, providing users…

0

Addressing the Latest Kubernetes NGINX Ingress Controller CVE-2024-7646 Vulnerability

A new Kubernetes vulnerability, CVE-2024-7646, has recently been identified and demands urgent attention from security professionals and DevOps teams. This vulnerability severely threatens the security of systems using the widely adopted ingress-nginx controller, potentially allowing attackers to bypass annotation validation and gain unauthorized access to…

0