Sign in to view Rich’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Rich’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Cambridge, Massachusetts, United States
Sign in to view Rich’s full profile
Rich can introduce you to 10+ people at Chainguard
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
571 followers
500+ connections
Sign in to view Rich’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Rich
Rich can introduce you to 10+ people at Chainguard
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Rich
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Rich’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
571 followers
-
Rich Schofield liked thisRich Schofield liked thisThis month I worked on a very important project and I'm happy to announce that it came out right on time 🪄 Happy #Halloween from Chainguard! 🎃🧙♂️🦇
-
Rich Schofield liked thisTo my Government of Canada friends, this meetup today is not to be missed! Check out what is happening with Aurora, GC Secure Artifacts, and Chainguard -GC Employees Only- details below:Rich Schofield liked thisAurora Meetup – October 30, 2025 Join us for the next Aurora Meetup, featuring two deep-dive sessions on cloud-native security and GitOps innovation in the Government of Canada. 🔹 Attack and Defend with Tetragon – Glen Yu from PWC Learn how Tetragon leverages eBPF for real-time visibility, threat detection, and defense in Kubernetes environments. 🔹 State of Argo CD 3.x – Nicholas M. from Red Hat Explore what’s new in Argo CD 3.x and how it enhances GitOps workflows for modern cloud operations. Plus, hear project updates from William Hearn on the latest developments around Aurora, GC Secure Artifacts, and Chainguard. 📅 October 30, 2025 | GC employees only 🔗 Join the conversation on GCXchange: https://lnkd.in/geP4UHzy 🔗 Learn more about Aurora: https://lnkd.in/gDGVevTw #Aurora #CloudNative #Kubernetes #Tetragon #ArgoCD #eBPF #GitOps #DevSecOps #Chainguard #PublicSectorInnovation #Cybersecurity
-
Rich Schofield liked thisRich Schofield liked thisSpeed or Security? The most effective engineering teams know it’s not an "either-or" choice. On the industry panel hosted by chainguard this week, I shared how we approach this at Motorola Solutions. Building mission-critical platforms for public safety means trust is everything. My core message: Don't just "shift left"; shift ownership. The goal is to transform security from a centralized gatekeeper into a decentralized, ambient capability within every team. A great security program is a productivity multiplier, measured by the developer-hours it saves, not just the vulnerabilities it finds. When you build a "paved road" platform where the secure way is the easy way, provable trust becomes your competitive advantage. Great sharing the stage with Marina Novikova. Thank you to Dustin Kirkland for moderating the discussion.
-
Rich Schofield reacted on thisRich Schofield reacted on thisWe just integrated Chainguard’s hardened, zero-CVE containers into [R] AI Mission System, [R] Data Platform, and [R] Application Platform. What that means: → Zero-CVE containers that don’t waste your time → STIG + FIPS baked in, not duct-taped on → ATO timelines that don’t eat quarters → Built for edge ops, not conference slides Because building fast means nothing if it’s not secure. And secure means nothing if it can’t deploy in time. Welcome to defense at mission speed. #LFG 🚀 https://lnkd.in/eQCNEDwKRaft Leverages Chainguard to Accelerate Secure Defense Innovation for National Security - Raft | Operationalize Data & Agentic AIRaft Leverages Chainguard to Accelerate Secure Defense Innovation for National Security - Raft | Operationalize Data & Agentic AI
-
Rich Schofield liked thisRich Schofield liked thisRIP VMware home lab. I've paid for VMUG Advantage and run this little stack since 2019. It has run NSX, Tanzu K8s, OSS Cluster API K8s, and EKS-anywhere clusters and given many Cilium live demos. But no, Broadcom, I am not spending time and money to certify on VCF, AND pay for VMUG Advantage to keep access to product licenses. I feel what the industry feels very personally today.
-
Rich Schofield liked thisRich Schofield liked thisIt was sad to see Google shutdown the Kaniko project yesterday. This was Priya Wadhwa's starter project on my team at Google when she first joined, and all the adoption still sort of shocks me today. We're going to keep a fork of this alive for anyone that's interested in using it. Fork is up here: https://lnkd.in/eJStVjf9 We'll get a blog post up later this week explaining our full plans for the project going forward. If you're interested or have any questions, please reach out!GitHub - chainguard-dev/kaniko: Build Container Images In KubernetesGitHub - chainguard-dev/kaniko: Build Container Images In Kubernetes
Experience & Education
-
Chainguard
*** ********** ***** ********
-
*********
********* ********* ********
-
******
********* ******** *********
-
********* **********
*** ********** *********** undefined
-
View Rich’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View Rich’s full profile
-
See who you know in common
-
Get introduced
-
Contact Rich directly
Explore more posts
-
HashiCorp
319K followers
Modern cloud environments are complex—and optimizing them requires a programmatic, automated approach. With HashiCorp, organizations gain: 💲 Proactive cost visibility and management 🫧 More efficient cloud and resource utilization 💪 Resilient, automated cloud operations at scale Unlock lower costs, streamlined workflows, and stronger ROI, without compromising efficiency or security. Learn more: https://ibm.co/6043EDZCZ
30
-
One Identity
36K followers
Access creep is real, and it’s putting your org at risk. ⚠️ Manual provisioning leads to identity sprawl, excessive privileges and forgotten access that lingers long after employees leave. See how automation and role-based access control (RBAC) can help you clean up your directories and enforce least privilege across AD and Entra ID. 👉 https://okt.to/DWZq0I #admanagement #IdentitySprawl #identitysecurity
36
-
SecureB4
50K followers
What if you could eliminate security blind spots, slash remediation times, and integrate security directly into your development pipeline? That's the power of Application Security Posture Management (ASPM). While traditional methods create noise, ASPM delivers clarity. Swipe left to learn how to transform your security from a bottleneck into a strategic advantage. #ASPM #AppSec #CyberResilience #SecurityPosture
14
-
Cortex by Palo Alto Networks
58K followers
🚨 See what you once couldn’t. Stop what you never knew was there. Many security teams think they’re seeing everything, until it’s too late. Traditional tools miss these blind spots. Cortex XSIAM and XDR don’t. Dive into the hidden gaps in traditional security visibility and how to uncover what your tools might be missing. 🔍 Stay ahead of threats. Eliminate blind spots. https://bit.ly/45mBGiv
106
-
Splunk
784K followers
Alert fires. Clock starts ticking. Revenue is on the line. The old way: manual dashboard deep dives, log spelunking, repeat. The new way: The AI Troubleshooting Agent in Splunk Observability Cloud that hands you the root cause, the evidence, AND a remediation plan. MTTR just called. It's getting shorter. Get all the details right here: https://splk.it/3OmkIfu #SplunkO11y
31
-
Tanium
91K followers
Two birds, one IT tool ⚒️ Tanium Director of Product Enablement Architecture Ashley McGlone and Senior Advanced Consulting Engineer Jason Wasser discuss how to make Linux patching in Tanium easier across operating systems with three different methods: Zero Touch, Lite Touch, and Automate. Watch part two of this #TechTalks episode: https://bit.ly/43VZ1qt
39
2 Comments -
Cloud Security Podcast
15K followers
🎬 TRAILER DROP Is your security strategy stuck in the visibility phase? Tomorrow, we go beyond dashboards and dive straight into actionable cloud defense with Brian McHenry and Paul Barbosa from Check Point Software Point. Think less “tool sprawl,” more “security muscle memory.” 👀 We get into: - Why multi-cloud is still breaking security programs - How edge security is quietly becoming your fastest zero-day response layer - What CNAPP misses without context from your firewalls - And why shared intelligence at machine speed is the new playbook We speak about cloud and edge security maturity plus bonus golf tips, Tokyo sushi hacks, and a defense-in-depth glow-up. 🔔 Full interview drops tomorrow. #CloudSecurity #EdgeSecurity #CNAPP #CloudPodcast #RSA2025 #CloudSecurityPodcast
22
1 Comment -
NCS Group
432K followers
As generative AI becomes more integral to enterprise operations, building trust is paramount. 🔐 🎙️ Our experts from Cohesity, Pure Storage, and Tricentis reveal the most critical emerging trends in this space, from using Retrieval-Augmented Generation (RAG) models to ground AI in trusted data to the necessity of testing the data that AI is trained on. Praveen Vunnava, Global Field Chief Technology Officer at Cohesity, shares how modern enterprises can stay ahead of evolving threats by leveraging AI-powered threat detection, implementing a zero-trust architecture and establishing dedicated cyber event response capabilities. Matthew Oostveen, Chief Technology Officer for APJ at Pure Storage, explores why trust is the new frontier in enterprise AI. He details how intelligent infrastructure, including RAG implementations and autonomous storage systems, is key to scaling AI confidently, sustainably, and responsibly. Dheeraj Yadav, Senior Manager of Solution Architecture at Tricentis, takes us inside the world of intelligent automation. He emphasises rigorously testing the data and models behind GenAI is crucial for ensuring compliance, eliminating bias, and achieving reliable, secure outcomes in your AI initiatives. True innovation isn't just about building powerful models—it's about ensuring they are responsible, secure, and reliable from the ground up. Tune in here for the full conversations: 🎧 With Cohesity: https://lnkd.in/ew-9ZuBF 🎧 With Pure Storage: https://lnkd.in/ef7XRqtD 🎧 With Tricentis: https://lnkd.in/e5bqZ5gu #NCS #ImpactInsights #TechPodcast #AI #AITrust #DataProtection #ResponsibleAI #Innovation
34
-
Sonrai Security
8K followers
“It took 5 minutes to solve what we couldn’t for years.” Relay Network’s DevOps team didn’t need another tool that just flagged issues. They needed a fix for legacy IAM, SCP sprawl, and permissions chaos across AWS. With the Cloud Permissions Firewall, they: ✅ Disabled unused AWS regions ✅ Quarantined zombie resources ✅ Cleaned up years of policy sprawl in minutes 🌐 Hear it straight from Brendan Putek, Director of DevOps at Relay Network: https://lnkd.in/egw7MWkg Sonrai Security → 🤯 One-click least privilege. 😁 Zero disruption.
23
-
Zero Networks
12K followers
🥁Drumroll, please....We’re thrilled to unveil the Zero Networks + CyberArk Integration live at this year’s CyberArk #Impact Conference, April 9–11 in #Boston! For the first time (in foreverrr🎵), #CyberArk customers can close privileged ports like 3389 (RDP) without adding friction to authentication or logon workflows. This game-changing integration enhances security by ensuring all RDP connections are routed through CyberArk's Privileged Session Manager (PSM). 📅 Don't miss Nicholas DiCola breakout session on Thursday, April 10th, 2:30 – 3:15 pm ET to get an expert’s view on how the integration: ✔️ Ensures operational continuity ✔️ Protects every asset with network #microsegmentation—stopping lateral movement and #ransomware in their tracks ✔️Applies Just-in-Time (JIT) #MFA at the network layer for airtight access control ➕More on the integration here: https://hubs.li/Q03g7xgJ0
62
8 Comments -
Carlos Delatorre
Saris AI • 9K followers
From Kubernetes diffs and ECS weighted traffic shifting to Terraform auto-approvals and GitOps enhancements, we packed Q1 with powerful CD platform upgrades. Highlights include: ✅ Namespace enforcement for Kubernetes & Helm. ✅ Blue-Green weighted traffic for ECS. ✅ Git-triggered pipelines in GitLab. ✅ Environment-type-based freeze windows. ✅ API-driven observability. 👉 Dive into what’s new: https://lnkd.in/dKGG3h95
24
-
Christian Posta
solo.io • 13K followers
🤯 An interesting concept from #AAuth that I see cropping up when talking to our customers for AI->MCP server use-cases is that of the "𝐑𝐞𝐬𝐨𝐮𝐫𝐜𝐞 𝐓𝐨𝐤𝐞𝐧". A resource token is issued by a resource (MCP server) and 𝘣𝘪𝘯𝘥𝘴 𝘢 𝘳𝘦𝘲𝘶𝘦𝘴𝘵 𝘧𝘰𝘳 𝘢𝘶𝘵𝘩 𝘵𝘰 𝘢 𝘴𝘱𝘦𝘤𝘪𝘧𝘪𝘤 𝘢𝘨𝘦𝘯𝘵, and the agent takes that to the IdP for auth approval. 𝐇𝐨𝐰 𝐢𝐭 𝐰𝐨𝐫𝐤𝐬 𝐭𝐨𝐝𝐚𝐲 𝐢𝐧 𝐌𝐂𝐏/𝐎𝐀𝐮𝐭𝐡: ▪️ Agent connects to MCP server, MCP issues 401 and WWW-Authenticate ▪️ Agent pulls protected-resource-metadata, discovers auth server, and starts an auth flow with authorization server (with scopes, client_id, etc) ▪️ Auth Server sees request from client, may prompt the user for consent, and decides whether to issue scopes/access_token 𝐏𝐫𝐨𝐛𝐥𝐞𝐦𝐬 𝐭𝐡𝐚𝐭 𝐜𝐚𝐧 𝐜𝐫𝐨𝐩 𝐮𝐩: ▪️ Authorization Server has no idea what the MCP server really needs/wants ▪️ Authorization Server is going to issue access_token for an MCP server, but nobody knows for sure the MCP server is legit (ie, AS issues token for "dogfood.company.com/mcp" but the server that prompted this was "d0gfood.company.com/mcp" ▪️ A user could fiddle with the /authorization url / scopes (or MITM) 𝐀𝐀𝐮𝐭𝐡 𝐬𝐨𝐥𝐯𝐞𝐬 𝐭𝐡𝐢𝐬 𝐰𝐢𝐭𝐡 𝐚 𝐑𝐞𝐬𝐨𝐮𝐫𝐜𝐞 𝐓𝐨𝐤𝐞𝐧. Which builds on AAuth Agents and Resources (ie, MCP servers) proving their cryptographic identity. How it works: ▪️ Agent connects to MCP server, MCP server validates agent's identity and issues 401 with "Agent-Auth" header which contains a resource token ▪️ This resource token is a JWT that binds the MCP server's cryptographic identity to the agent's identity AND explicitly declares the scopes required (or rich authorizations). ▪️ The AI agent takes this resource token (bound to its identity, and the MCP server identity) and sends this to the auth server requesting access ▪️ The auth server verifies both identities, decides based on policy whether scopes/auth should be allowed, and issues an access token bound to the agent's identity This solves the previous problems. To go into more detail, take a look at the deep dive i've put together for AAuth (Agent Auth) and the exploratory AAuth spec: 👉 Deep Dive: https://lnkd.in/g9V_P9NR 👉 Spec: https://lnkd.in/gGrn23wx
74
5 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content