Portland, OR, USA
Apr 16, 2019   |  By Michael Churchman
“Docker vs. Kubernetes.” That’s a phrase you hear frequently these days. Unfortunately, its meaning is more difficult to unpack than may first appear, largely because “Docker” can refer to multiple things (a container runtime, an orchestrator associated with that runtime, a company, and more).
Apr 10, 2019   |  By Sonya Koptyev
When people talk about the cloud, they tend to center discussion around applications. To a point, that makes sense. Applications are one thing that runs in the cloud, and hosting applications is an important reason for using the cloud. However, by focusing only on applications, it can be easy to overlook the broader context in which they live. At the end of the day, applications are only one part of broader cloud workloads.
Apr 8, 2019   |  By Sonya Koptyev
You might once have been told not to trust anyone over 30. Now, if you help manage IT infrastructure or applications, you should not trust anyone in general. That’s because we’re now living in the age of zero-trust security. Zero-trust security (sometimes also called trustless security) is a new paradigm that can help improve your security posture. Keep reading for a definition of zero-trust security, followed by tips on how to implement it.
Apr 2, 2019   |  By Twain Taylor
If you were to make a list of tech buzzwords that are trending today, it would likely include three terms that start with service: Service mesh, Service Fabric and service bus. These terms all sound similar. And they are all important concepts to understand if you are adopting microservices, API-driven architectures and cloud-native computing in general. That said, these three terms each mean different things.
Apr 1, 2019   |  By James Jones
A major part of modern DevSecOps is ensuring that you are tracking and mitigating security issues throughout the full lifecycle of application development. As such, integrating Twistlock into your CI pipeline can ensure you prevent vulnerable container images from even making it into your registries when they violate vulnerability and compliance thresholds.
Feb 5, 2019   |  By Twistlock
While organizations at first tended to view the cloud as a complement to their existing infrastructures, cloud-based resources and services have evolved into the default means of deploying applications. Cloud adoption rates across a range of businesses and industries have reached 96 percent, and almost 90 percent of all data center workloads run in the cloud.
Feb 5, 2019   |  By Twistlock
This is the 2nd ebook from The New Stack’s series focused on the Kubernetes ecosystem. Unlike the 1st ebook that centered on the state of the Kubernetes ecosystem, this ebook shines a light on answering the question: How well does Kubernetes work in production?
Feb 1, 2019   |  By Twistlock
Organizations moving their software assets into the cloud are discovering that when it comes to IT security, they have entered an alternate universe. It’s a place where security objectives have not changed, but the way to achieve them is completely different. Is this a safe place? How are people managing their cloud native security?
Feb 1, 2019   |  By Twistlock
As organizations look to build, deploy and manage cloud-native applications at scale, many are evaluating and choosing Kubernetes ecosystem. The New Stack provides an in-depth look at Kubernetes and the ecosystem that has emerged around this leading container orchestration tool. This ebook serves as a primer for both newcomers, assessors and implementers who are looking to make the most of the ecosystem of products and services emerging around Kubernetes.
Jan 1, 2019   |  By Twistlock
As containers gain mainstream momentum, the cloud native ecosystem is experiencing rapid growth of new technologies and projects that are spinning off and expanding from the initial core of containers. One particularly intense area of innovation is in workload deployment/management. There are many options in the cloud-native environment and the differences between these technologies are often small and nuanced.
Mar 21, 2019   |  By Twistlock
In this episode, Liron Levin, Chief Architect of Twistlock, explains the history behind the decision to use Go to build Twistlock, the criteria that was used to assess all the possible languages, some key findings and advantages of using Go, and, of course, some story time.
Mar 19, 2019   |  By Twistlock
In this episode, Ian discusses how Twistlock is able to automate the creation and maintenance of the product documentation. He talks through the entire OSS-based system that is in place to manage documentation contributions, the tools used to build the docs, as well as a code deep dive through the search indexing and crawling to surface the docs to users.
Mar 13, 2019   |  By Twistlock
In this episode, Michael talks through the history of monitoring software applications and the various approaches that were used in the past, some best practices and new ways of doing monitoring in the cloud native space.
Feb 26, 2019   |  By Twistlock
In this episode, Yuval from Twistlock Labs explains the details of the CVE discovered in RunC, two ways that it can be exploited, and what the fix looks like.
Feb 25, 2019   |  By Twistlock
The Twistlock Intelligence Stream is comprised of over 30 distinct threat intelligence feeds to provide you with accurate, up-to-date vulnerability information about your environment. This data is ingested by the Twistlock Console, our dashboard which runs as a container within your environment.