Home Security Page 2

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Container security the static part

Container security – the static part

In one of my previous articles I wrote about the concepts of container security from a business point of view. One of the topics to start with is to secure the...
Route

Choose the right cloud provider: 7 considerations

It should be no surprise: cloud providers have quickly become the platform of choice for IT-savvy organizations. In the last couple of years, more and more organizations jumped ship and started...
Running Containers in Production for Dummies

Running Containers in Production for Dummies

The acclaimed For Dummies Series, this fantastic resource explores containers, orchestrator choices and helps you skillfully navigate the challenges of deploying containerized applications in production. Read it now! hbspt.forms.create({ portalId: "6620659", formId: "9042decd-1356-4ea9-9200-76f0132e2fdc" });
A business view on container security

A business view on container security

Containers are hot and container security is booming. At present there are a lot of websites dedicated to this topic. It’s highly technical and the number of subtopics is very large....
Code review tips and tricks

Code review tips and tricks to improve security

In an agile world, security can be a time consuming effort that slows down the software delivery processes. However, security topics should not be ignored or shifted to the very last...

What Compliance-as-Code means for your business

Have you already heard of Compliance-as-Code? Are you familiar with “compliance officers” in your organization? If not, you might be curious what 'compliance' means. Quite recently there have been some talks...

eBook: Kubernetes Security Guide

Download this guide to learn best practices for implementing Kubernetes and container security. Kubernetes has become the de facto operating system of the cloud. However, Kubernetes can be challenging to operate. Teams...
Storage and connectivity

Edge computing explained and what you need to know

It could very well be the case you have already heard of edge computing. Many organizations already use edge computing in their day-to-day business. Before we dive into more details about...
GitLabs State of the Union on DevSecOps

GitLabs State of the Union on DevSecOps

It is that time of the year when the state of the “insert your paradigm of choice” reports are crossing the desks of Execs and Senior Managers, that purport to show...
5 surprising conclusions from the Portworx 2019 Container Adoption Survey

5 surprising conclusions from the Portworx 2019 Container Adoption Survey

The 2019 Annual Container Adoption Survey is sponsored by Portworx and Aqua Security. The report features insights from over 500 IT professionals across a variety of industries and company sizes. The...