Home Operations Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Identity-Based microsegmentation

Identity-Based micro-segmentation boosts cloud security

Companies increasingly execute cloud-first strategies for their core business applications. Some organizations even put a deadline on when they want to close down their data-center in the near future. DevOps teams...
Whitepaper Styra OPA at Scale

Open Policy Agent at scale

Managing consistent, secure ands scalable rules across teams, clusters and clouds With the rapid growth of cloud-native services and containerized applications, enterprises have been facing a quiet, universal and mounting crisis: there...
Hashicorp knocks the ball to the Boundary

Hashicorp knocks the ball to the Boundary

It only seems 5 minutes ago that Hashicorp released Boundary at their October 2020 Hashiconf online extravaganza. But like the rest of their products, it evolves at a serious pace. Quick recap...
Defects

Dealing with DevOps Metrics and KPIs

Key Performance Indicators (KPIs) are a great principle to measure how well your organization performs. DevOps accelerates the automation of (almost) everything within the entire organization. Therefore you need useful KPIs...
Shift security left_ secure your CloudFormation templates

Shift security left: secure your CloudFormation templates

DevOps practitioners use Infrastructure-as-Code (IaC) to provision resources they need in the public Cloud. AWS offers CloudFormation as their native IaC solution. CloudFormation templates are written in JSON or YAML format....
HCP Vault

Announcing HCP Vault Public Beta

You will most likely know that Hashicorp Cloud Platform can allow the creation of a cloud-based Consul deployment on the AWS and Azure clouds. This enables the quick and significantly easier...
Styra is Open Policy Agent’s big, enterprise brother for policy-as-code

Styra is Open Policy Agent’s big, enterprise brother for policy-as-code

Developers have more access to, and control over, compute resources than ever. Public cloud, infrastructure-as-code and cloud-native development and consumption models are great accelerators of what developers can achieve in short...
HashiCorp Vault Unlocking the Cloud Operating Model Security

Unlocking the Cloud Operating Model: Security

Understanding the security benefits that come with managing Identity and Secrets in a multi-cloud environment For many enterprises, the logistical realities of cloud adoption often requires a shift from a traditional on-premise...

SideScanning Technical Brief – Inside the Engine that Powers Orca Security

Delivered as SaaS, Orca’s SideScanning™ technology reads your cloud configuration and workloads’ runtime block storage out-of-band, giving you workload-level security across AWS, Azure, and GCP - without the gaps in coverage...
The-Ultimate-Guide-to-AWS,-Azure,-and-GCP-Cloud-Asset-Visibility

The Ultimate Guide to AWS, Azure, and GCP Cloud Asset Visibility

It’s no secret that cloud deployments are sky-rocketing globally, with organizations of all sizes and industries transitioning at least some of their infrastructure and assets to the cloud. Are visibility and...