
Managing the Security of Kubernetes Container Workloads
In this series of articles entitled Securing Kubernetes for Cloud Native Applications, we’ve discussed aspects of security for each of the layers that …

Where are we going with the Giant Swarm API?
In the coming months we are going to take a new direction with our API. In this blogpost we share the reasoning behind this shift.

Applying Best Practice Security Controls to a Kubernetes Cluster
This is the penultimate article in a series entitled Securing Kubernetes for Cloud Native Applications, and follows our discussion about securing the …

Securing the Configuration of Kubernetes Cluster Components
In the previous article of this series Securing Kubernetes for Cloud Native Applications, we discussed what needs to be considered when securing the i …

Securing the Base Infrastructure of a Kubernetes Cluster
The first article in this series Securing Kubernetes for Cloud Native Applications, provided a discussion on why it’s difficult to secure Kubernetes, …

Why Is Securing Kubernetes so Difficult?
If you’re already familiar with Kubernetes, the question in the title will probably resonate deep within your very being. And if you’re only just gett …

Why You Should Not Neglect Your Developer’s Kubernetes Clusters
So you’ve finally succeeded in convincing your organization to use Kubernetes and you’ve even gotten first services in production. Congratulations!

How Giant Swarm Enables a New Workflow
By now we all know that Amazon AWS changed computing forever and it actually started as an internal service. The reason for the existence of AWS is pr …

Logging Best Practices for Kubernetes using Elasticsearch, Fluent Bit and Kibana
Logging is one of the most powerful tools we have as developers. It’s no accident that when things go wrong in production, one of a developer’s first …