Join us

ContentUpdates and recent posts about Trivy..
Link
@faun shared a link, 5 months, 1 week ago
FAUN.dev()

The Quiet Revolution in Kubernetes Security

Nigel Douglas discusses the challenges of security in Kubernetes, particularly with traditional base operating systems. Talos Linux offers a different approach with a secure-by-default, API-driven model specifically for Kubernetes. CISOs play a critical role in guiding organizations through the shif.. read more  

Link
@faun shared a link, 5 months, 1 week ago
FAUN.dev()

Kubernetes DNS Exploit Enables Git Credential Theft from ArgoCD

A new attack chain messes withKubernetes DNS resolutionandArgoCD’s certificate injectionto swipe GitHub credentials. With the right permissions, a user inside the cluster can reroute GitOps traffic to a fake internal service, sniff auth headers, and quietly walk off with tokens. What’s broken:GitOp.. read more  

Kubernetes DNS Exploit Enables Git Credential Theft from ArgoCD
Link
@faun shared a link, 5 months, 1 week ago
FAUN.dev()

Rethinking Efficiency for Cloud-Native AI Workloads

AI isn’t just burning compute—it's torching old-school FinOps. Reserved Instances? Idle detection? Cute, but not built for GPU bottlenecks and model-heavy pipelines. What’s actually happening:Infra teams are ditching cost-first playbooks for something smarter—business-aligned orchestrationthat chas.. read more  

Rethinking Efficiency for Cloud-Native AI Workloads
Link
@faun shared a link, 5 months, 1 week ago
FAUN.dev()

Dynamic Kubernetes request right sizing with Kubecost

Kubecost’s Amazon EKS add-on now handlesautomated container request right-sizing. That means teams can tweak CPU and memory requests based on actual usage—once or on a recurring schedule. Optimization profiles are customizable, and resizing can be baked into cluster setup using Helm. Yes, that mean.. read more  

Dynamic Kubernetes request right sizing with Kubecost
Link
@faun shared a link, 5 months, 1 week ago
FAUN.dev()

Kubernetes right-sizing with metrics-driven GitOps automation

AWS just dropped a GitOps-native pattern for tuning EKS resources—built to runoutsidethe cluster. It’s wired up withAmazon Managed Service for Prometheus,Argo CD, andBedrockto automate resource recommendations straight into Git. Here’s the play: it maps usage metrics to templated manifests, then sp.. read more  

Kubernetes right-sizing with metrics-driven GitOps automation
Link
@faun shared a link, 5 months, 1 week ago
FAUN.dev()

Why I Ditched Docker for Podman (And You Should Too)

Older container technologies like Docker have been prone to security vulnerabilities, such as CVE-2019-5736 and CVE-2022-0847, which allowed for potential host system compromise. Podman changes the game by eliminating the need for a persistent background service like the Docker daemon, enhancing sec.. read more  

Story
@laura_garcia shared a post, 5 months, 1 week ago
Software Developer, RELIANOID

🌐 NIS2 is reshaping cybersecurity compliance across Europe.

At RELIANOID, we are fully aligned and compliant with NIS2 requirements, helping organizations strengthen their security posture. 👉 Explore more: https://www.relianoid.com/security-compliances/relianoid-nis2-compliance/ #NIS2#CyberSecurity#Compliance#Regulation#EUCompliance#InfoSec#DataProtection#Go..

nis2 compliance RELIANOID
Story
@ketbostoganashvili shared a post, 5 months, 1 week ago
Technical Content Writer

Send emails with Vercel and Mailtrap

Next.js Vercel Mailtrap.io

Learn how to integrate Mailtrap with your Vercel-hosted applications to send transactional emails with reliable delivery and comprehensive analytics.

Story
@ketbostoganashvili shared a post, 5 months, 1 week ago
Technical Content Writer

Send emails with Bolt.new and Mailtrap

Bolt Mailtrap.io

Learn how to integrate Mailtrap with your Bolt.new application to send transactional emails and manage contacts without writing complex code.

Link
@anjali shared a link, 5 months, 1 week ago
Customer Marketing Manager, Last9

APM for Kubernetes: Monitor Distributed Applications at Scale

Understand Kubernetes APM by linking request flows with pod, node, and cluster data to get complete visibility at scale.

k8
Trivy, maintained by Aqua Security, is a comprehensive open source security scanner used across container images, file systems, Git repositories, Kubernetes clusters, and cloud infrastructure. It detects vulnerabilities, exposed secrets, IaC misconfigurations, and license issues. Trivy is fast, easy to use, and integrates with CI/CD pipelines, GitOps workflows, Kubernetes admission controllers, and developer tooling. It also generates SBOMs in multiple formats and supports deep scanning of OCI artifacts. Its wide coverage and low-friction adoption make it one of the most popular tools in modern DevSecOps and cloud-native security ecosystems.