Home Security Page 2

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Do we still need architecture in a DevOps world?

Modern IT architecture, with all the layers of abstraction, is difficult. It also seems like every couple of months a brand new shiny thing pops up out of Silicon Valley, Seattle,...
VMware-s-not-done-expanding-its-Kubernetes-ecosystem-buys-Octarine

VMware’s not done expanding its Kubernetes ecosystem; buys Octarine

VMware announced that its acquiring Octarine, a Kubernetes security startup offering continuous security and compliance for automated pipelines. Intrinsic security Reading the VMware blog post on the acquisition, Octarine is part of VMware's intrinsic security...
Runtime security with Sysdig Falco

Runtime security with Sysdig Falco

Lately I've been researching possibilities to detect anomalies during runtime in containers. I came across the open source project Sysdig Falco which seems to do just that. Quoted from their site:...
MobiledgeX Cloud Foundations

MobiledgeX is the Amazon of Edge Computing

We all know Amazon.com, the online retailer. In the Netherlands, we have similar 'platform' players, that, for a fee, will let 3rd party resellers sell their inventory via the site. It's...
Security_IaC

Integrating Security into your Infrastructure-as-Code pipelines

Security is often left at the back of the queue when developing code, Priority is on Minimal Viable Product, and after delivering a feature, it's quickly on to the next. The...
Segregation of duties

Kubernetes security considerations & best practices

As of now we are in the middle of a big boost in Kubernetes adoption. The number of organizations deploying containers in production using this popular orchestration tool grows every week....
HashiCorp Vault

Deploying and configuring HashiCorp Vault to service Terraform

In the third post of this series you will have noticed that we configured the Terraform environment to utilize a HashiCorp Vault server to provide one time use authentication for your...
Code review tips and tricks

Code review tips and tricks to improve security

In an agile world, security can be a time consuming effort that slows down the software delivery processes. However, security topics should not be ignored or shifted to the very last...
Colaborative-Communication

DevSecOps – Building a Secure DevOps Pipeline

DevSecOps is the next stage in the DevOps revolution; integrating security practices into the development and operations workflows at an early stage. There is little argument that DevOps as a paradigm has...
Protecting your serverless workloads is not a “nice to have”

Protecting your serverless workloads is not a “nice to have”

Serverless computing has gained a lot of traction the last couple of years. Many organizations are already experimenting with it and using its fullest potential for their applications. As described in...