Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Introducing Calico Load Balancer and Seamless VM-to-Kubernetes Migration

SAN JOSE, Calif., March 23, 2026 — Tigera, the creator and maintainer of Project Calico, today announced a major expansion of its Unified Network Security Platform for Kubernetes, aimed at helping enterprises consolidate infrastructure and accelerate the migration of legacy workloads to cloud-native platforms.

Hot code burns: the supply chain case for letting your containers cool before you ship

In September 2025, dozens of popular JavaScript packages, like chalk and debug, were compromised on the npm registry. These packages are so ubiquitous they end up in everything: front-end apps, back-end microservices, and CI tooling. Developers didn’t do anything wrong, they just ran the same command they always do: npm install chalk. But then the malware arrived silently. This wasn’t a bug in an operating system. It wasn’t a virus on someone’s laptop.

Secure and Scale VMware VKS with Calico Kubernetes Networking

VMware vSphere Kubernetes Service (VKS) is the CNCF-certified Kubernetes runtime built directly into VMware Cloud Foundation (VCF), which delivers a single platform for both virtual machines and containers. VKS enables platform engineers to deploy, manage, and scale Kubernetes clusters while leveraging a comprehensive set of cloud services. And with VKS v3.6, that foundation just got significantly more powerful.

Calico Load Balancer: Simplifying Network Traffic Management with eBPF

Ever had a load balancer become the bottleneck in an on-prem Kubernetes cluster? You are not alone. Traditional hardware load balancers add cost, create coordination overhead, and can make scaling painful. A Kubernetes-native approach can overcome many of those challenges by pushing load balancing into the cluster data plane.

Lift-and-Shift VMs to Kubernetes with Calico L2 Bridge Networks

On paper, lift-and-shift VM migration to Kubernetes sounds simple. Compute can be moved. Storage can be remapped. But many migration projects stall at the network boundary. VM workloads are often tied to IP addresses, network segments, firewall rules, and routing models that already exist in the wider environment. That is where lift-and-shift becomes much harder than it first appears.

What Proximity Badges and Cards Actually Do in Secure Spaces

Security systems can feel abstract until you arrive at a door and need to get through it. That moment exposes the gap between policy and usability. Proximity badges and cards are part of the bridge between security intent and real world movement. They allow authorized people to enter specific areas without keys or codes, and they do it in a way that fits into daily patterns of movement. This article explains how they work, why they matter, and what they change in everyday operations.

AI Assistant for Calico: Troubleshooting at the Speed of Thought

Despite the wealth of data available, distilling a coherent narrative from a Kubernetes cluster remains a challenge for modern infrastructure teams. Even with powerful visualization tools like the Policy Board, Service Graph, and specialized dashboards, users often find themselves spending significant time piecing together context across different screens.

How Your Office Printer Scanner Can Become a Workflow Automation Hub

Modern business operations often move at the speed of software, yet physical documents remain a constant presence in the daily grind. Most teams view their hardware as a simple tool for reproduction or digital conversion. However, the true potential of these devices lies in their ability to act as a bridge between tangible paperwork and automated digital systems. When configured correctly, a standard piece of office equipment can trigger complex sequences that save hours of manual data entry.

What Your EKS Flow Logs Aren't Telling You

If you’re running workloads on Amazon EKS, there’s a good chance you already have some form of network observability in place. VPC Flow Logs have been a staple of AWS networking for years, and AWS has since introduced Container Network Observability, a newer set of capabilities built on Amazon CloudWatch Network Flow Monitor, that adds pod-level visibility and a service map directly in the EKS console.