Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Whitepaper Securing Kubernetes Workloads

Securing Kubernetes Workloads

Securing Kubernetes Workloads Why RBAC is not Enough for Intent-Based APIs Kubernetes has officially arrived - with a recent survey from the CNCF stating that 78% of enterprises are using it in production...
Why you must shift left security in the software development lifecycle

Why you must shift left security in the software development lifecycle

This is post 3 of 4 in the Amazic World series sponsored by GitLab 1. Toolchain tax: just the tip of the iceberg? 2. Why the Pipeline is key for Cloud Engineers 3. Changing...

New trends and buzzwords in the DevOps era: are you ready for 2021?

As the year 2020 comes to an end, it's nice to look back at the trends and hypes we got so far. It is even more exiting to see which trends...
Whitepaper Styra Kubernetes Security via Admission Control

Kubernetes Security via Admission Control

Kubernetes isn’t (just) fun and games anymore. It’s being rolled out for production; it’s mission-critical; and all the security and compliance rules and regulations of the old world need to somehow...
Shadow IT

Coming out of the dark – what is shadow IT and how to deal...

Everyone who works in a large organization knows it: there are (probably) a lot of IT projects that are not officially sanctioned. Although not a new phenomenon, it is important to...
four-eyes principle

The four-eyes principle: what’s important in a DevOps world

DevOps accelerates everything from code to production. Manual approvals for releases and deployments quickly become a thing of the past. DevOps teams need to embrace security and compliance in their day-to-day...
Photo by Matthew Henry on Unsplash

Useful things you need to know about system hardening

Since Dev and Ops related activities blend together in a DevOps world, developers need to understand more than just coding their application. Their role also includes typical Ops work: packaging and...
Get the evil out – don’t run containers as root

Get the evil out – don’t run containers as root

Containers are not hot and shiny anymore. They are a common piece of the puzzle when it comes to building great software. But a common pitfall, even now, is that many...
Threat-Modeling-enhances-system-security

Threat Modeling enhances system security

Over the last couple of years, security has become a major topic for every DevOps team. Cloud-first initiatives of various companies help to push the DevSecOps movement forward. The transition to...
F5 Container Ingress Services

F5 Container Ingress Services blends BIG-IP with cloud-native workloads

In this final installment of our Amazic World series sponsored by F5, we’re looking at F5’s continued investments in datacenter security for container deployments using F5 Container Ingress Services. This is post...