Was this too chaotic of a thread to follow?! Same, twin. Go to edera.link/kceu26 and you can get a much more professional and clear rundown. Point is: If you're going to be in Amsterdam for #kubecon, you better say hi!
Was this too chaotic of a thread to follow?! Same, twin. Go to edera.link/kceu26 and you can get a much more professional and clear rundown. Point is: If you're going to be in Amsterdam for #kubecon, you better say hi!
March 26th! Last Day! You've made it! We've made it! But have you stopped by the booth yet? Have you taken on the challenge! It's your last chance before we all scatter off like tulip pollen in the wind, or something like that!
Why Security of Kubernetes Comes Down to Linux Security talk by Marina Moore on March 25 at 11:45 CEST
March 25th is lowkey. All we have going on is a booth, a challenge, and a killer talk by Edera Research Scientist Marina Moore. Practically a rest day, right? Right??! π
And the evening of March 24th? Our favorite KubeCon tradition: @kuberoke.bsky.social. Keep your eyes peeled for a special π appearance from @denhamparry.co.uk !
kuberoke.love/events/sprin...
Edera at KubeCon + CloudNativeCon. Swing by and play for a chance to win a Happy Gilmore Putter.
March 24: KubeCon + CloudNativeCon officially kicks off. We'll be at booth 881 all day, but keep your eyes peeled for our challenge booth, where you can win a special prize...
πππ
Tulips & Taps: Welkom to Kubecon Happy Hour at Heineken
In the evening, we're kicking off the parties with our Tulips & Taps: Welkom to Kubecon Happy Hour co-hosted with @thenewstack.io, @antithesis.com, @dash0.com, groundcover, @minimus.io, and Moonlight Marketing. You aren't going to want to miss this!
luma.com/q0zk8pyy
Edera at Open Source SecurityCon Europe
Edera at Platform Engineering Day Europe
Tarmageddon: One Bug, Four Forks, and a Disclosure Scavenger Hunt talk by Alex Zenal and Marina Moore March 23 14:40 CEST
Project Lightning Talk: A Maintainerβs Tour Of Tag Security And Compliance talk by Marina Moore March 23 at 10:40 CEST
March 23rd is when things really start to get rolling. No more rest! First, co-lo day! We're sponsoring Platform Engineering Day and we'll also be at Open Source SecurityCon. But that's just during the day...
#PlatEngDay
March 22? That's a rest day. A prepare day. An explore Amsterdam day. Or, if you really want, it can be a "Talk to Edera" day. Book some time at edera.link/kceu26
Type 1 Fun with Type 1 Hypervisors: The Comeback of Hardware-Backed Isolation Talk by Alex Zenla at 10:25 CEST
Kernel Observability: The Missing Layer in Cloud Native Engineering talk by Jed Salazar at 12:30 CEST on March 21
Edera at Cloud Native Rejekts
March 21 we'll be at @rejekts.io The can't miss b-side? Of course we're already there! We've also got talks from @alex.zenla.io and @jsalazar.co there.
An image that shows all of Edera's plans for KubeCon: 3/21/26: Rejekts all day Talk: Kernel Observability: The Missing Layer in Cloud Native Engineering 12:30 Talk: Type 1 Fun with Type 1 Hypervisors 10:25 3/22/26: Explore Amsterdam 3/23/26: Platform Engineering Day Open Source SecurityCon Talk: Tarmageddon: One Bug, Four Forks, and a Disclosure Scavenger Hunt 14:40 Tulips & Taps: Welkom to Kubecon Happy Hour 18:00-20:00 3/24/26: Kuberoke 21:00-1:00 KubeCon all day (Booth #881) 3/25/26 KubeCon all day (Booth #881) Talk: Why Security of Kubernetes Comes Down to Linux Security 11:45 3/26/26 KubeCon All Day (Booth #881)
Alright, @cncf.io KubeCon EU (and all the other fun) is two weeks away. Let's talk about what we've got tee'd up for you...
π§΅
edera.link/kceu26
Heading to NVIDIA GTC in San Jose? Already tired and you haven't even packed? Plan some relaxation into your schedule with the Infrastructure Security Lounge. Escape the conference chaos, enjoy some snacks and drinks, and follow the conference livestream. Register in advance, or just pop in!
Edera X Google Cloud Marketplace
Edera is now live on Google Cloud Marketplace.
You can procure Edera directly in GCP β and use your existing cloud credits to secure your container and AI workloads.
Full isolation. Near-native performance. No procurement friction.
Security without compromise, now one click away.
edera.link/gcp
Wtf is confidential computing, and why should you care? Check out this primer from Edera Research Scientist Marina Moore: youtu.be/iBhsXkp_mio
A ride photo that shows the Edera team on the Guardians of the Galaxy Disneyland ride. Faces range from pure joy, through terror, to dissociation and acceptance.
The various emotions and faces of working at a startup.
Stitch looks up at the camera, interrupted at work on a laptop in front of a neon EDERA sign.
A message from our new engineer, who we found on our Disneyland Offsite: "My name Stitch. Stitch isolate AI agent with Edera. Edera means nobody's workloads get left unsecured."
A valentine from Ivy, Edera's pink cartoon axolotl that reads "no known vulnerabilities except falling for you"
A valentine from Ivy, Edera's pink cartoon axolotl that reads "near-native performance. Unreal chemisty."
A valentine from Ivy, Edera's pink cartoon axolotl that reads "Strong boundaries. Even stronger feelings."
Thus hypervised by Cupidβs silicon art,
Our love runs near-nativeβsecure from start.
Send these Valentine's to someone you love as much as we at Edera love securing your containers and AI workloads.
O containers fair, in OCI attire,
We grant thee kernels sovereign and apart;
O AI agents, kindled bright with fire,
No lateral trespass stains thy tender heart.
3/4
He boots the heart before the flesh awakes,
No sandboxed sigh nor fragile truce heβll bless;
Each suitor stands alone for passionβs sake,
Isolated from rivalrous access.
2/4
Sonnet #01000101 01000100 01000101 01010010 01000001
Not feathered shafts alone make lovers true,
But Cupid throned in ring-zero above;
A Type-1 god, whose arrows cleave clean through
All shared-kernel illusions masking love.
1/4
Want to catch us at our upcoming events? We'll be at @hpsf.bsky.social Con, @qconferences.com , @rejekts.io, and @cncf.io KubeCon EU in the next few months. Check it out at edera.dev/events
ICYMI: You can check out the slides from Edera Research Scientist Marina Moore on "AI in the Cluster: Navigating Exploits, Isolation, and Vendor lock-in" edera.link/ai-cluster-pdf
Four people stand at a conference booth smiling. The booth design features a pink cartoon axolotl dressed as QEII with the tagline "Runtime Security fit for Royalty"
A conference talk with many people wearing conference lanyards seated in a white room.
A person stands on stage in front of two screens, smiling while she gives a talk on "AI in the Cluster: Navigating Exploits, Isolation, and Vendor lock-in"
We came to London to spill the tea on container securiTEA and had such a great time at @containerdays.bsky.social London.
Huge thanks to the organizers for bringing cloud native and AI communities together in one place. The energy all week was fantastic.
Kubernetes' nodes/proxy GET call, commonly used by monitoring tools, can be exploited to execute privileged commands and compromise entire clusters without leaving an audit trail. It's a feature, not a bug.
By @joabj.bsky.social feat. @edera.dev's @jsalazar.co
Open standards like SPIFFE and SPIRE provide strong isolation guarantees, building a foundation for zero trust.
Thanks to @edera.dev
if you are interested in my #FOSDEM talk on Sunday at 15:30 in the #SBOM devroom, I have published a demo that outlines what we will be discussing: codeberg.org/kaniini/fosd...
Kubernetes' nodes/proxy GET call, commonly used by monitoring tools, can be exploited to execute privileged commands and compromise entire clusters without leaving an audit trail. It's a feature, not a bug.
By @joabj.bsky.social feat. @edera.dev's @jsalazar.co
Kubernetes' nodes/proxy GET call, commonly used by monitoring tools, can be exploited to execute privileged commands and compromise entire clusters without leaving an audit trail. It's a feature, not a bug.
By @joabj.bsky.social feat. @edera.dev's @jsalazar.co
Are you planning on @containerdays.bsky.social? Be sure to meet up with @denhamparry.co.uk and Marina Moore from Edera. You'll want to check out Marina's talk "AI in the Cluster: Navigating Exploits, Isolation, and Vendor Lock-in"
Oh, and you'll definitely want to get half off your reg:
Zero trust doesnβt have to wait for special hardware.
Workload identity (SPIFFE/SPIRE) + strong isolation lets workloads prove where and how they runβand earn trust cryptographically.
Itβs confidential-computing-like guarantees, on commodity infra. Marina Moore has more for @thenewstack.io