Enlightning

Learn CNCF projects with Whitney and her lightboard.

  • ⚡️Enlightning - Keeping Your Secrets Secure with SOPS11:19

    ⚡️Enlightning - Keeping Your Secrets Secure with SOPS

    Watch Video
  • ⚡️ Enlightning - Keeping Your Secrets Secure with SOPS1:25:46

    ⚡️ Enlightning - Keeping Your Secrets Secure with SOPS

    SOPS (Secrets OPerationS) is an editor of encrypted files and is a simple way to secure and manage sensitive assets. SOPS supports YAML, JSON, ENV, INI, and binary formats. By being able to integrate

    Watch Video
  • Demystifying the Software Bill Of Materials (SBOM) and why everyone's talking about them1:23:16

    Demystifying the Software Bill Of Materials (SBOM) and why everyone's talking about them

    Tanzu Developer Advocate and Enlightning host Whitney Lee speaks with Tanzu Solutions Architect, Alex Barbato to unpack the Software Bill of Material (SBOM). SBOMs have gained a lot of attention in th

    Watch Video
  • ⚡️ Enlightning - Flexible Authorization with OpenFGA1:41:17

    ⚡️ Enlightning - Flexible Authorization with OpenFGA

    OpenFGA is a flexible authorization engine built for developers and designed to make it easy for them to model their application permissions and add and integrate fine-grained authorization into their

    Watch Video
  • ⚡️ Enlightning - Open Policy Containers: The What, Why, and How1:20:21

    ⚡️ Enlightning - Open Policy Containers: The What, Why, and How

    The Open Policy Containers project provides a secure software supply chain for Open Policy Agent (OPA) policies, enabling a policy-as-code workflow for maintainers and consumers of policies to easily

    Watch Video
  • ⚡️ Enlightning - Service Identity Authentication and Authorization Using Athenz2:03:45

    ⚡️ Enlightning - Service Identity Authentication and Authorization Using Athenz

    Yahoo developed and open sourced a service authentication and role-based authorization system called Athenz to address the core zero trust principles. Yahoo uses Athenz to bootstrap their instances de

    Watch Video
  • ⚡️ Enlightning - Understanding Network Service Mesh2:06:06

    ⚡️ Enlightning - Understanding Network Service Mesh

    Network Service Mesh takes concepts from traditional L7 application service meshes and brings them down to L3 payloads, enabling your workloads to get the connectivity, security, and observability the

    Watch Video
  • ⚡️ Enlightning - Cloud Native Confidential Computing with Confidential Containers1:49:25

    ⚡️ Enlightning - Cloud Native Confidential Computing with Confidential Containers

    Confidential Containers allow users to run sensitive cloud native workloads in an untrusted cloud. We'll explore how this is possible and how you can use the project with your own workloads. Join h

    Watch Video
  • ⚡️ Enlightning - Solving for the Bottom Turtle with SPIFFE and SPIRE1:53:41

    ⚡️ Enlightning - Solving for the Bottom Turtle with SPIFFE and SPIRE

    Explore SPIFFE (Secure Production Identity Framework For Everyone), a CNCF project revolutionizing identity management in cloud-native systems. This session introduces you to SPIFFE’s approach to

    Watch Video
  • ⚡️ Enlightning - Hello Paralus, Goodbye RBAC Stress!1:16:11

    ⚡️ Enlightning - Hello Paralus, Goodbye RBAC Stress!

    As Kubernetes becomes the backbone of modern infrastructure, securing multi-tenant clusters becomes a top priority for platform engineering teams. In this lightboard session, we will delve into the

    Watch Video
  • ⚡️ Enlightning - Keycloak: The Open Source IAM for Modern Applications1:56:36

    ⚡️ Enlightning - Keycloak: The Open Source IAM for Modern Applications

    Keycloak is an open source Identity and Access Management (IAM) solution for modern applications and services. It is designed to secure applications with modern industry standards like OAuth2, OpenID

    Watch Video
  • ⚡️ Enlightning - What Is Access Policy Orchestration? What Is Hexa?1:14:09

    ⚡️ Enlightning - What Is Access Policy Orchestration? What Is Hexa?

    Hexa Policy Orchestration enables you to manage disparate access policy formats across cloud providers, IAM systems, networks, and data. Join host Whitney Lee and guest Gerry Gebel to learn more!

    Watch Video
  • ⚡️ Enlightning - Be a Security Hero with Kubescape as Your Sidekick1:45:59

    ⚡️ Enlightning - Be a Security Hero with Kubescape as Your Sidekick

    Security is something we all need, and something we would all love to forget about. 🙂 Kubescape is a CNCF project that helps to secure your clusters easily and quickly. It helps you validate the c

    Watch Video
  • ⚡️Enlightning - What Is Dex?1:43:57

    ⚡️Enlightning - What Is Dex?

    Many kinds of identity providers utilize different architectures and protocols existing in this world. The commonly-spread standard among cloud native applications (including Kubernetes) is now the Op

    Watch Video
  • ⚡️ Enlightning - Cilium Networking, Security and Observability2:38:33

    ⚡️ Enlightning - Cilium Networking, Security and Observability

    Now that we have learned so much about networking and service mesh solutions, let’s look at what Cilium can do. Cilium has an answer for each use case that folks adopt a service mesh for, as well as a

    Watch Video
  • ⚡️ Enlightning - Sailing Into a Sea of Microservices With Istio2:12:10

    ⚡️ Enlightning - Sailing Into a Sea of Microservices With Istio

    Istio is a Graduated CNCF Project that provides application networking for a distributed microservices architecture with built-in traffic engineering, observability, identity, policy, AAA, and encrypt

    Watch Video
  • ⚡️ Enlightning - Learn Service Mesh With Kuma2:22:38

    ⚡️ Enlightning - Learn Service Mesh With Kuma

    Service mesh is the future of application connectivity, offering immediate enhancements to your application traffic’s security, reliability, and observability. In this episode of ⚡️ Enlightning, disc

    Watch Video
  • ⚡️ Enlightning - Linkerd: The Stress-Free Service Mesh2:19:51

    ⚡️ Enlightning - Linkerd: The Stress-Free Service Mesh

    Linkerd is the first service mesh, and it is still - by far - the least stressful way to add security, reliability, and observability to any Kubernetes cluster. Using a mesh to add these critical func

    Watch Video
  • An Overview of Authority to Operate (ATO) and Compliance1:29:08

    An Overview of Authority to Operate (ATO) and Compliance

    VMware Tanzu Developer Advocate and Enlightning host Whitney Lee speaks with Denee Lake, a modern compliance architect with VMware Tanzu Labs, about continuous authority to operate (ATO), a term commo

    Watch Video
  • ⚡️ Enlightning - Kubernetes Networking2:40:44

    ⚡️ Enlightning - Kubernetes Networking

    Let’s demystify Kubernetes Networking and Container Network Interfaces (CNIs) with Duffie Cooley and Whitney Lee. We will discuss the Kubernetes networking model and how a CNI makes all the magic happ

    Watch Video
  • loading
    Loading More...