Home Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Shadow IT

Coming out of the dark – what is shadow IT and how to deal...

Everyone who works in a large organization knows it: there are (probably) a lot of IT projects that are not officially sanctioned. Although not a new phenomenon, it is important to...
four-eyes principle

The four-eyes principle: what’s important in a DevOps world

DevOps accelerates everything from code to production. Manual approvals for releases and deployments quickly become a thing of the past. DevOps teams need to embrace security and compliance in their day-to-day...
Photo by Matthew Henry on Unsplash

Useful things you need to know about system hardening

Since Dev and Ops related activities blend together in a DevOps world, developers need to understand more than just coding their application. Their role also includes typical Ops work: packaging and...
Get the evil out – don’t run containers as root

Get the evil out – don’t run containers as root

Containers are not hot and shiny anymore. They are a common piece of the puzzle when it comes to building great software. But a common pitfall, even now, is that many...
Threat-Modeling-enhances-system-security

Threat Modeling enhances system security

Over the last couple of years, security has become a major topic for every DevOps team. Cloud-first initiatives of various companies help to push the DevSecOps movement forward. The transition to...
F5 Container Ingress Services

F5 Container Ingress Services blends BIG-IP with cloud-native workloads

In this final installment of our Amazic World series sponsored by F5, we’re looking at F5’s continued investments in datacenter security for container deployments using F5 Container Ingress Services. This is post...
F5 NGINX Ingress Controller and App Protect in a cloud native container world

F5 NGINX Ingress Controller and App Protect in a cloud-native, container world

In this post in our series of F5’s application services, we’re looking at how F5 and specifically NGINX help application development and DevOps teams, with features like the NGINX Ingress Controller...
F5 whitepaper How To Protect Against The OWASP Top 10 And Beyond

How to protect against the OWASP top 10 and beyond

Application security is a top priority in the IT security landscape for every organisation. Applications are the pathway to your data, protecting your business means it’s critical that you understand the...
F5 From Code to Customer commitment to application delivery and security

‘From Code to Customer’, F5’s commitment to application delivery and security

F5’s motto is From Code to Customer. In this post, we’ll look at how F5’s product portfolio implements that vision with its products. This is post 1 of 4, in the Amazic...
Ten cloud migration barriers and how to tackle them

10 cloud migration barriers and how to tackle them

Winning teams at large enterprises adopt cloud technology at a rapid pace. This brings changes to 3 well-known aspects: people, process & technology. Despite good efforts, there are also departments that...