
Sign up to save your podcasts
Or
In this episode of The New Stack Makers, recorded at KubeCon + CloudNativeCon Europe, Alex Williams speaks with Ville Aikas, Chainguard founder and early Kubernetes contributor. They reflect on the evolution of container security, particularly how early assumptions—like trusting that users would validate container images—proved problematic. Aikas recalls the lack of secure defaults, such as allowing containers to run as root, stemming from the team’s internal Google perspective, which led to unrealistic expectations about external security practices.
The Kubernetes community has since made strides with governance policies, secure defaults, and standard practices like avoiding long-lived credentials and supporting federated authentication. Aikas founded Chainguard to address the need for trusted, minimal, and verifiable container images—offering zero-CVE images, transparent toolchains, and full SBOMs. This security-first philosophy now extends to virtual machines and Java dependencies via Chainguard Libraries.
The discussion also highlights the rising concerns around AI/ML security in Kubernetes, including complex model dependencies, GPU integrations, and potential attack vectors—prompting Chainguard’s move toward locked-down AI images.
Learn more from The New Stack about Container Security and AI
Chainguard Takes Aim At Vulnerable Java Libraries
Clean Container Images: A Supply Chain Security Revolution
Revolutionizing Offensive Security: A New Era With Agentic AI
Join our community of newsletter subscribers to stay on top of the news and at the top of your game.
4.3
3131 ratings
In this episode of The New Stack Makers, recorded at KubeCon + CloudNativeCon Europe, Alex Williams speaks with Ville Aikas, Chainguard founder and early Kubernetes contributor. They reflect on the evolution of container security, particularly how early assumptions—like trusting that users would validate container images—proved problematic. Aikas recalls the lack of secure defaults, such as allowing containers to run as root, stemming from the team’s internal Google perspective, which led to unrealistic expectations about external security practices.
The Kubernetes community has since made strides with governance policies, secure defaults, and standard practices like avoiding long-lived credentials and supporting federated authentication. Aikas founded Chainguard to address the need for trusted, minimal, and verifiable container images—offering zero-CVE images, transparent toolchains, and full SBOMs. This security-first philosophy now extends to virtual machines and Java dependencies via Chainguard Libraries.
The discussion also highlights the rising concerns around AI/ML security in Kubernetes, including complex model dependencies, GPU integrations, and potential attack vectors—prompting Chainguard’s move toward locked-down AI images.
Learn more from The New Stack about Container Security and AI
Chainguard Takes Aim At Vulnerable Java Libraries
Clean Container Images: A Supply Chain Security Revolution
Revolutionizing Offensive Security: A New Era With Agentic AI
Join our community of newsletter subscribers to stay on top of the news and at the top of your game.
271 Listeners
283 Listeners
152 Listeners
41 Listeners
9 Listeners
627 Listeners
3 Listeners
435 Listeners
4 Listeners
201 Listeners
988 Listeners
189 Listeners
184 Listeners
191 Listeners
65 Listeners
59 Listeners
87 Listeners
62 Listeners