RootNode.es's Avatar

RootNode.es

@rootnode.es

Technical and product marketing for humans

5
Followers
8
Following
16
Posts
03.09.2025
Joined
Posts Following

Latest posts by RootNode.es @rootnode.es

Es un placer poder apoyaros y colaborar con vosotros.

Nos morimos de ganas de aprender compartiendo experiencias con los asistentes. โœจ๐Ÿ’–

09.03.2026 13:19 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Imagen con fondo negro que presenta a RootNode.es como sponsor oficial de #SOSZ26. A la izquierda aparece su logotipo junto al nombre de la marca y, separado por una lรญnea vertical, a la derecha se muestra el nombre del evento Startup Open Space acompaรฑado del logotipo de Cachirulo Valley.

Debajo se indica Zaragoza y la fecha 21 de marzo de 2026. En la parte inferior se lee โ€œSponsor oficial #SOSZ26โ€. El diseรฑo mantiene una estรฉtica limpia y corporativa que destaca la colaboraciรณn entre la empresa patrocinadora y el evento.

Imagen con fondo negro que presenta a RootNode.es como sponsor oficial de #SOSZ26. A la izquierda aparece su logotipo junto al nombre de la marca y, separado por una lรญnea vertical, a la derecha se muestra el nombre del evento Startup Open Space acompaรฑado del logotipo de Cachirulo Valley. Debajo se indica Zaragoza y la fecha 21 de marzo de 2026. En la parte inferior se lee โ€œSponsor oficial #SOSZ26โ€. El diseรฑo mantiene una estรฉtica limpia y corporativa que destaca la colaboraciรณn entre la empresa patrocinadora y el evento.

ยกUn sponsor salvaje del #SOSZ apareciรณ!
Por primer aรฑo,ย @rootnode.esย patrocina el #SOSZ26

En RootNode.es hacen marketing tรฉcnico y de producto. ๐Ÿ—ฃ๏ธ
Ayudan a startups a conectar con su audiencia mediante contenido tรฉcnico que educa, inspira, y soluciona sus problemas.

09.03.2026 08:01 ๐Ÿ‘ 4 ๐Ÿ” 4 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
How to run rootless containers | Sysdig Discover how to run containers without root, adapt images for unprivileged users, and use capabilities and user namespaces to reduce container escape risk.

Running workloads unprivileged is one of security's best practices. Discover with Matt Kim, @captaingolo.net and @sysdig.com several strategies to run rootless containers:

๐Ÿ› ๏ธ What to modify in your images.
๐Ÿ‘ฅ How to use User Namespaces.
๐Ÿ” When to use Capabilities.

www.sysdig.com/blog/how-to-...

12.02.2026 14:16 ๐Ÿ‘ 3 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1
Preview
AI is still a workload: A practical guide to securing AI workloads | Sysdig AI workloads arenโ€™t magic โ€” theyโ€™re code running on servers, and they need the same security fundamentals as any other workload. This article breaks down the key risks and mitigations for three common...

๐Ÿ”ฎ AI looks like black magic.
๐Ÿค– However itโ€™s made of old-style servers and APIs.

Secure:
- LLM clients like any SaaS.
- External agents like APIs.
- Your own agents like other backend workloads.

Learn more in this article by @alejandrovu.bsky.social for @sysdig.com
www.sysdig.com/blog/ai-is-s...

27.01.2026 17:37 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1
Holidays greeting card surrounded by christmas decorations

Holidays greeting card surrounded by christmas decorations

3D Printed tree decoration ball

3D Printed tree decoration ball

3D Printed tree decoration ball, next to the flat parts it is made of.

3D Printed tree decoration ball, next to the flat parts it is made of.

Happy Holidays! We wish you a joyful 2026.

To celebrate the new year, we designed a tree decoration you can 3D print yourself. It's a ball formed by three flat stripes that fold. Check it out here:
rootnode.es/misc/2025-ne...

23.12.2025 11:04 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Kubernetes 1.35 - New security features | Sysdig Discover the new security features in Kubernetes 1.35, from breaking changes like cgroup v1 removal to safer defaults for auth, images, and namespaces.

๐Ÿšฎ Kubernetes 1.35 is letting go of some old technology:

cgroup v1 in favor of cgroup v2
SPDY in favor of WebSockets
gogo protobuf in favor of standard libs

โ„น๏ธ www.sysdig.com/blog/kuberne...

02.12.2025 15:24 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Kubernetes 1.35 - New security features | Sysdig Discover the new security features in Kubernetes 1.35, from breaking changes like cgroup v1 removal to safer defaults for auth, images, and namespaces.

๐Ÿ”‘ Token secrets for CSI drivers in Kubernetes 1.35:

๐Ÿ—‚๏ธ New field to provide secrets to CSI drivers.
๐Ÿ›ก๏ธ Keeping sensitive data separate from configuration.

โ„น๏ธ www.sysdig.com/blog/kuberne...

02.12.2025 15:24 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Kubernetes 1.35 - New security features | Sysdig Discover the new security features in Kubernetes 1.35, from breaking changes like cgroup v1 removal to safer defaults for auth, images, and namespaces.

๐Ÿฆน๐Ÿป Constrained impersonation in Kubernetes 1.35:

๐Ÿ’ก Impersonator: User acting as another user.
๐Ÿšง They are now limited to their original permissions.
๐Ÿ›ก๏ธ This prevents privilege escalations.

โ„น๏ธ www.sysdig.com/blog/kuberne...

02.12.2025 15:24 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Kubernetes 1.35 - New security features | Sysdig Discover the new security features in Kubernetes 1.35, from breaking changes like cgroup v1 removal to safer defaults for auth, images, and namespaces.

๐ŸŒ User namespaces when using the host network in Kubernetes 1.35:

๐Ÿ›ก๏ธ Pods using the host network no longer need to also use the host users.
๐Ÿ” They can run as privileged without being root.

โ„น๏ธ www.sysdig.com/blog/kuberne...

02.12.2025 15:24 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Kubernetes 1.35 - New security features | Sysdig Discover the new security features in Kubernetes 1.35, from breaking changes like cgroup v1 removal to safer defaults for auth, images, and namespaces.

๐Ÿชช Increased verifications when pulling images in Kubernetes 1.35:

๐Ÿ”Ž Performs credentials check when accessing images, not only on pull.
๐Ÿ‘ฅ To keep images secure in multi-tenant clusters.

โ„น๏ธ www.sysdig.com/blog/kuberne...

02.12.2025 15:24 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Kubernetes 1.35 - New security features | Sysdig Discover the new security features in Kubernetes 1.35, from breaking changes like cgroup v1 removal to safer defaults for auth, images, and namespaces.

Kubernetes 1.35 brings changes around security:

๐Ÿšฎ Removal of cgroup v1 support
๐Ÿชช Increased verifications when pulling images
๐Ÿฆน๐Ÿป Limits to impersonation
๐ŸŒ User namespaces when using the host network
๐Ÿ”‘ Token secrets for CSI drivers

And more!
www.sysdig.com/blog/kuberne...
#Kubernetes #Security #k8s

02.12.2025 15:24 ๐Ÿ‘ 2 ๐Ÿ” 4 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐Ÿ”ฅ Codex can help with the basics. It correctly identifies the source of the alert and can create a GitHub issue.

๐Ÿ’ฃ However, it doesnโ€™t explain things correctly and can be manipulated to ignore some data. You must supervise it.

14.11.2025 16:54 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

This article covers this use case by connecting Codex to several MCPs.

First, retrieves a list of alerts using the Sysdig MCP

Then investigates the issue with the GitHub MCP without downloading the code.

It ends by creating a GitHub issue with context for the relevant team to implement a fix.

14.11.2025 16:54 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
LinkedIn This link will take you to a page thatโ€™s not on LinkedIn

๐Ÿค” Should you use AI to investigate security alerts?

The one investigating a security alert is not usually who wrote the code that triggered the alert, so they struggle investigating if itโ€™s a real security incident.

๐Ÿค– Can AI help here?

Check the full experiment at:
www.sysdig.com/blog/investi...

14.11.2025 16:54 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 2
Preview
Why Chat Control, the European Proposal for Scanning Private Communications, is a Shitshow Chat Control is the popular name given to a regulation proposal inside the European Council to scan all private communications in hopes of protecting children from sexual abuse. It expands over the ex...

๐Ÿšจ Europe almost turned into a police state. ๐Ÿ‡ช๐Ÿ‡บ๐Ÿ‘€

๐Ÿ“ A regulation proposal referred to as โ€Chat Controlโ€ aimed to protect children by spying on all private communications.

Discover why Chat Control is both ineffective and dangerous.
rootnode.es/blog/chat-co...

12.10.2025 10:45 ๐Ÿ‘ 3 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Cutting Edge Technology is not a Feature History is full of visionary products that didnโ€™t sell well. What happened? And, what can we learn to save our startup from that fate?

๐ŸŽ‰ ยกFirst Article in our blog! โ†’ Most technology startups position their technology as a game-changer. However, their clients just want solutions to their problems.

๐Ÿ‘€ Letโ€™s analyze some failures and successes and see what we can learn from them.

rootnode.es/blog/technol...

30.09.2025 09:36 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1
Selfie of capitangolo smiling and pointing to a computer screen. The computer screen shows the rootnode.es website. Capitangolo wears a white, blue, and green striped t-shirt on a similar palette to the website.

Selfie of capitangolo smiling and pointing to a computer screen. The computer screen shows the rootnode.es website. Capitangolo wears a white, blue, and green striped t-shirt on a similar palette to the website.

We are open for business! ๐ŸŽ‰

At RootNode.es, we craft messaging that aligns with the pains of your potential clients and highlights the value of your product.

Then, we produce engaging content that organically pushes that messaging and positions your brand.

We would love to work with you. Ping us!

03.09.2025 10:41 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 2