
Sign up to save your podcasts
Or
In this episode of The New Stack Makers, recorded at KubeCon + CloudNativeCon Europe, Alex Williams speaks with Ville Aikas, Chainguard founder and early Kubernetes contributor. They reflect on the evolution of container security, particularly how early assumptions—like trusting that users would validate container images—proved problematic. Aikas recalls the lack of secure defaults, such as allowing containers to run as root, stemming from the team’s internal Google perspective, which led to unrealistic expectations about external security practices.
The Kubernetes community has since made strides with governance policies, secure defaults, and standard practices like avoiding long-lived credentials and supporting federated authentication. Aikas founded Chainguard to address the need for trusted, minimal, and verifiable container images—offering zero-CVE images, transparent toolchains, and full SBOMs. This security-first philosophy now extends to virtual machines and Java dependencies via Chainguard Libraries.
The discussion also highlights the rising concerns around AI/ML security in Kubernetes, including complex model dependencies, GPU integrations, and potential attack vectors—prompting Chainguard’s move toward locked-down AI images.
Learn more from The New Stack about Container Security and AI
Chainguard Takes Aim At Vulnerable Java Libraries
Clean Container Images: A Supply Chain Security Revolution
Revolutionizing Offensive Security: A New Era With Agentic AI
Join our community of newsletter subscribers to stay on top of the news and at the top of your game.
4.3
3131 ratings
In this episode of The New Stack Makers, recorded at KubeCon + CloudNativeCon Europe, Alex Williams speaks with Ville Aikas, Chainguard founder and early Kubernetes contributor. They reflect on the evolution of container security, particularly how early assumptions—like trusting that users would validate container images—proved problematic. Aikas recalls the lack of secure defaults, such as allowing containers to run as root, stemming from the team’s internal Google perspective, which led to unrealistic expectations about external security practices.
The Kubernetes community has since made strides with governance policies, secure defaults, and standard practices like avoiding long-lived credentials and supporting federated authentication. Aikas founded Chainguard to address the need for trusted, minimal, and verifiable container images—offering zero-CVE images, transparent toolchains, and full SBOMs. This security-first philosophy now extends to virtual machines and Java dependencies via Chainguard Libraries.
The discussion also highlights the rising concerns around AI/ML security in Kubernetes, including complex model dependencies, GPU integrations, and potential attack vectors—prompting Chainguard’s move toward locked-down AI images.
Learn more from The New Stack about Container Security and AI
Chainguard Takes Aim At Vulnerable Java Libraries
Clean Container Images: A Supply Chain Security Revolution
Revolutionizing Offensive Security: A New Era With Agentic AI
Join our community of newsletter subscribers to stay on top of the news and at the top of your game.
377 Listeners
266 Listeners
285 Listeners
154 Listeners
41 Listeners
9 Listeners
585 Listeners
628 Listeners
3 Listeners
434 Listeners
4 Listeners
200 Listeners
181 Listeners
190 Listeners
63 Listeners
47 Listeners
63 Listeners
52 Listeners