Copy
We aim to serve as a calm place where the focus is on the bright minds who play such an important role for the technologists we serveView in browser »
The New Stack Update

ISSUE 260: The Times They Are a Changing (Again)

Talk Talk Talk

“Multitenant buildings such as skyscrapers “must invest in more internal security and coordination between tenants for events that affect the building. The costs of doing these enhanced measures can be quite high both in terms of manpower and equipment. The situation is much the same with Kubernetes clusters that are multitenanted. They require internal traffic monitoring, resource limits, and admission controllers that must all be configured to ensure restricted access as well as non-interference.”

___
SUSE engineer Mikhail Kozorovitskiy, “Avoiding the Pitfalls of Multitenancy in Kubernetes
What's Happening

A first step when deciding how to take control of cloud infrastructure security is to realize how the cloud — and all of the potential exploits associated with it — is a very different universe than that of your traditional data center. Already, damages organizations have incurred in cryptojacking incidents alone have totaled millions of dollars.

This The New Stack Makers livestream podcast, hosted by Alex Williams, founder and publisher of The New Stack, focuses the security challenges associated with moving to a public cloud. This live Q&A featured Ankur Shah, vice president of products, Prisma Cloud by Palo Alto Networks; Alok Tongaonkar, director, data science at Palo Alto Networks; and Gaspar Modelo-Howard, principal data scientist at Palo Alto Networks.

Advanced Threats in the Orchestrated Cloud

The Times They Are a Changing (Again)

This week, we pulled a story down from The New Stack website — at the request of the subject of the article. This is not a decision we took lightly. As the self-appointed publication-of-record for the cloud native community, we stand by our journalism once it is posted for truth, posterity and the greater good, thwarting take-down requests by vendors and sponsors alike who may not agree with our coverage.

In this case, however, the request came from a person whom we profiled years ago, and the post was not only about this person’s considerable work in cloud native computing, but also a personal story of a difficult journey that was ultimately about overcoming obstacles.

In many ways, the story is already of another, more optimistic, era. Back then (and today) our editorial staff, like many IT trade publications, was made up of mostly older cis white dudes. We wanted to learn and welcome other voices to our world even if we were (and are) still clumsy at doing so. 

So when we were first approached earlier this week and asked to take down the post, we were ethically torn and a bit defensive. Can’t this story serve our readers and the broader community as an important example for others, we asked, somewhat crestfallen? The piece, we thought maybe with too much hubris, still shows how The New Stack welcomes diversity and inclusion (and if you don’t agree with these ideals, you’re reading the wrong newsletter). Also, we believe this is someone whose story and contributions to our industry is still very valuable today.

But we learned that having the post still out there was making this individual feel unsafe and not valued by this community. Unsafe is the keyword here, and it is one that should never be regarded lightly in this culturally combative climate. Many underrepresented communities have been under attack by hateful trolls, who, in many cases, want to do actual — physical — harm to people. When someone says they feel unsafe, believe them.  

There was another issue at play as well. When the story was first reported, the person participated willingly and openly. But now, this TNS post keeps coming up in Google searches and overshadowing the individual’s considerable technical talent. As was pointed out, software is indifferent to gender, race, class, sexual orientation or any of our other social identities, so why bring it up at all in a publication focused on technology? 

Point taken.

Our job is to provide clarity, explanation and analysis of at-scale development, deployment and management. We aim to serve as a calm place where the focus is on the bright minds who play such an important role for the technologists we serve. Our focus is on giving a voice to everyone — especially those who must have a voice but are too often not heard. We go to people for their expertise and the context they provide. It's the perspective that matters.

GitLab Open Sources Protocol Fuzzer Community Edition

GitLab has just open sourced its newly acquired Protocol Fuzzer Community Edition. That’s important, because most of this protocol and application programming interface (API) Fuzzer features were only available with a commercial license. There’s a real need for the debugging capabilities to be more widely available.

What Intel’s Fab-for-Hire Plan Could Offer Hyperscale Cloud Platforms

In what could be excellent news for hyperscale cloud providers looking for custom silicon to fit specific problems, Intel is changing what processor technology it builds CPUs with, who builds them, and who it builds chips for. Intel will use third-party fabrication plants when it needs to and offer its own fabs for custom designs, allowing x86 cores to be used in the same manner that’s made Arm IP so successful lately.

Deploy and Use the Anchore Image Vulnerability Scanner

No matter how careful you are, if you’re basing your containers on images that contain vulnerabilities, the security of your apps and services will be weak. As a cloud native developer, you cannot allow that. So what do you do? You make use of the available tools to scan those images for vulnerabilities. One such tool is the open source Anchore Engine. With this command-line tool, you can scan the images you want to use to find out if it contains any known CVE issues.

On The Road
APRIL 7 // 7 A.M. PT | 4 P.M. CET // VIRTUAL KubeCon+CloudNativeCon Europe 2021
APRIL 7 // 7 A.M. PT | 4 P.M. CET // VIRTUAL

Come together LIVE April 7 for a double dose of service mesh and load balancing to restore stability with a few K8s commands.

Hosted by The New Stack founder Alex Williams with VMware Senior Technologist Tuan Nguyen, Technical Product Manager Madhu Krishnarao, and Senior Technical Product Manager Bhushan Pai, see how systems pre-designed with resiliency in mind can restore stability with just a few Kubernetes commands.

Register Now!

The New Stack Makers podcast is available on:
SoundCloudFireside.fm — Pocket CastsStitcher — Apple PodcastsOvercastSpotifyTuneIn

Technologists building and managing new stack architectures join us for short conversations at conferences out on the tech conference circuit. These are the people defining how applications are developed and managed at scale.
Best of DevSecOps: Trends in Cloud Native Security Practices

This is the first in a new series of anthologies that assemble some of our best articles on a trending subject, paired with our editors’ insightful analysis to frame the bigger picture. These exclusive ebooks help developers, architects, operators and management go in-depth, quickly, on hot topics in at-scale development and management.

In this ebook, we explore how security practices are now being integrated into the development process, as well as the build pipeline and runtime operations of cloud native applications. You’ll learn more about:

  • How DevSecOps enables faster deployment cycles.
  • Why DevSecOps is necessary for cloud native architectures.
  • The challenges and benefits of DevSecOps practices.
  • The new role of developers and operators in security.
  • How to measure DevSecOps success.
  • Tools and best practices for adoption.
  • Emerging trends to pay attention to.
Download Ebook
We are grateful for the support of our ebook sponsor:


 
Copyright © 2021 The New Stack, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list

Email Marketing Powered by Mailchimp