Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

New trends and buzzwords in the DevOps era: are you ready for 2021?

As the year 2020 comes to an end, it's nice to look back at the trends and hypes we got so far. It is even more exiting to see which trends...
How to do DevSecOps with Chef InSpec and the DevSec

How to do DevSecOps with Chef InSpec and the DevSec.io Policy-as-Code framework

It doesn’t matter what operating system you are running, you are always at risk of being attacked. Common sense will help you in defending your assets but unfortunately, this will not...
Hashicorp knocks the ball to the Boundary

Hashicorp knocks the ball to the Boundary

It only seems 5 minutes ago that Hashicorp released Boundary at their October 2020 Hashiconf online extravaganza. But like the rest of their products, it evolves at a serious pace. Quick recap...
5 Upcoming cloud computing trends for 2020

5 Upcoming cloud computing trends for 2020

The year 2019 is about to end. Less than one month left. A lot of websites already try to predict the future in their posts about upcoming cloud computing trends for...
Ten cloud migration barriers and how to tackle them

10 cloud migration barriers and how to tackle them

Winning teams at large enterprises adopt cloud technology at a rapid pace. This brings changes to 3 well-known aspects: people, process & technology. Despite good efforts, there are also departments that...
Security_IaC

Integrating Security into your Infrastructure-as-Code pipelines

Security is often left at the back of the queue when developing code, Priority is on Minimal Viable Product, and after delivering a feature, it's quickly on to the next. The...
Whitepaper Styra Kubernetes Security via Admission Control

Kubernetes Security via Admission Control

Kubernetes isn’t (just) fun and games anymore. It’s being rolled out for production; it’s mission-critical; and all the security and compliance rules and regulations of the old world need to somehow...
GitLab-Ramps-Up-Channel-and-Partner-Investment-with-Launch-of-a-New-Global-Partner-Program (1)

GitLab ramps up channel and partner investment with launch of new partner program

Today Amazic, a trusted supplier and solution advisor for partners, announced they have joined forces with GitLab, the single application for the DevOps lifecycle, to accelerate DevOps practice buildout and go-to-market...

Identity-Based micro-segmentation boosts cloud security

Companies increasingly execute cloud-first strategies for their core business applications. Some organizations even put a deadline on when they want to close down their data-center in the near future. DevOps teams...