Kubernetes

Red Hat announced a collaboration with NEC Corporation to deliver 5G solutions built on Red Hat OpenShift, the enterprise Kubernetes platform. With NEC’s 5G core network solutions running on Red Hat OpenShift, organizations will be able to capitalize o…

Read More Red Hat and NEC Corporation collaborate to deliver 5G solutions built on Red Hat OpenShift platform

OpenNebula 6.0 “Mutara” is the first stable release of the OpenNebula 6 series, laying the groundwork for the completely integrated and automated enterprise edge cloud. The powerful distributed cloud architecture enabled by OpenNebula 6.0, and develope…

Read More OpenNebula 6.0 “Mutara”: Laying groundwork for an integrated and automated enterprise edge cloud

Celonis, IBM and Red Hat announced a global strategic partnership to help accelerate the adoption of the Celonis Execution Management System (EMS) and help deliver more flexibility and choice in how customers deploy the technology. The collaboration se…

Read More Celonis, IBM and Red Hat partnership drives flexibility and speed for enterprise digital transformation

Elastic announced new capabilities and updates across Elasticsearch, Kibana, and Elastic Cloud in the 7.12 release. The new features are designed to enable users to uncover insights and drive action with their data through the power of search. Directly…

Read More Elastic enables users to uncover insights and drive action with their data through the power of search

Amazon Elastic Kubernetes Service (EKS), a platform which gives customers the ability to run Kubernetes apps in the AWS cloud or on premises. Organizations are increasingly turning to Kubernetes to manage their containers. In the 2020 Cloud Native Survey, 91% of respondents told the Cloud Native Computing Foundation (CNCF) that they were using Kubernetes—an increase […]

The post Why Focusing on Container Runtimes Is the Most Critical Piece of Security for EKS Workloads? appeared first on Security Affairs.

Read More Why Focusing on Container Runtimes Is the Most Critical Piece of Security for EKS Workloads?