Lightning Talk: CEL: Hidden Feature of Kyverno Playground - Hoon Jo, Megazone

Presenters Hoon Jo Source KyvernoCon NA 2025 Unlock Kubernetes Validation Superpowers with Kyverno Playground! 🚀 Ever found yourself wrestling with Kubernetes validation rules, wishing for a simpler, more interactive way to test them out? Well, get ready to cheer, because the future of Kubernetes policy management just got a whole lot more exciting! Today, we’re diving deep into the incredible world of the Kyverno Playground and how it’s revolutionizing the way we approach validation and mutation policies. ...

November 24, 2025 · 4 min

Shift Left in Action: Automating CIS Compliance With Kyverno and CNCF Power Too... Yugandhar Suthari

Presenters Yugandhar Suthari Source KyvernoCon NA 2025 Shifting Left to Secure Your Kubernetes Kingdom: A Kano Story 🏰🛡️ Hey tech enthusiasts! Ever felt like security in Kubernetes is a constant game of whack-a-mole? You patch one vulnerability, and two more pop up. It’s a feeling many of us have experienced, and it’s precisely why the concept of “shifting left” has become so crucial in our development workflows. This presentation dives deep into how we can proactively secure our Kubernetes clusters, before any sneaky vulnerabilities can make their way into production. ...

November 24, 2025 · 5 min

Content Authenticity Initiative Trustmark With WASI WebGPU - Colin Murphy & Mendy Berger

Presenters Colin Murphy Mendy Berger Source WasmCon NA 2025 Unmasking the Truth: How the Content Authenticity Initiative is Fighting AI Deception 🛡️ In today’s digital landscape, where AI can conjure breathtaking images and videos in a blink, distinguishing reality from fabrication has become a monumental challenge. We’re living in an era where the line between genuine and AI-generated content is increasingly blurred, and the problem is only amplified when metadata – the breadcrumbs of information that tell us about an asset’s origin – gets stripped away during sharing. But fear not, intrepid digital explorers! The Content Authenticity Initiative (CAI) is here to shine a light on the truth, armed with innovative technology and a commitment to integrity. 💡 ...

November 24, 2025 · 5 min

Does the Component Model Require Extra Copying? - Luke Wagner, Fastly

Presenters Luke Wagner Source WasmCon NA 2025 WebAssembly’s Component Model: Unpacking Efficiency, Security, and the Near-Zero Copy Dream 🚀 WebAssembly (Wasm) has long been the darling of the web, promising blazing-fast performance right in our browsers. But its potential extends far beyond the browser tab! Luke Wagner from Fastly recently took us on a deep dive into the exciting evolution of WebAssembly’s Component Model, tackling a crucial question: does this new paradigm introduce more data copying, or is it paving the way for less? Get ready to explore how Wasm is becoming a powerhouse for server-side applications, cloud-native environments, and so much more, all while keeping efficiency and security at its core. ...

November 24, 2025 · 7 min

Si Vis Pacem, Adde Rete -- If You Want Peace, Add a Mesh! - Flynn, Buoyant & Bailey Hayes, Cosmonic

Presenters Flynn Bailey Hayes Source WasmCon NA 2025 Unlocking the Power of WebAssembly with Linkerd: A Secure, Observable Future 🚀 Ever felt like your microservices were a bit too… exposed? You’re not alone! The modern cloud-native landscape, with its intricate web of services, demands robust security, unwavering reliability, and crystal-clear observability. And when you throw cutting-edge technologies like WebAssembly (Wasm) into the mix, things can get even more interesting. That’s exactly what we explored in a recent deep dive, focusing on the powerful synergy between Linkerd, the service mesh that just works, and WebAssembly (Wasm), specifically orchestrated by WasmCloud on Kubernetes. Forget writing complex networking code or wrestling with security configurations – this is about letting your applications do what they do best, while a battle-hardened service mesh handles the heavy lifting. ...

November 24, 2025 · 5 min