Home Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Defects

Dealing with DevOps Metrics and KPIs

Key Performance Indicators (KPIs) are a great principle to measure how well your organization performs. DevOps accelerates the automation of (almost) everything within the entire organization. Therefore you need useful KPIs...
Shift security left_ secure your CloudFormation templates

Shift security left: secure your CloudFormation templates

DevOps practitioners use Infrastructure-as-Code (IaC) to provision resources they need in the public Cloud. AWS offers CloudFormation as their native IaC solution. CloudFormation templates are written in JSON or YAML format....
HCP Vault

Announcing HCP Vault Public Beta

You will most likely know that Hashicorp Cloud Platform can allow the creation of a cloud-based Consul deployment on the AWS and Azure clouds. This enables the quick and significantly easier...
Styra is Open Policy Agent’s big, enterprise brother for policy-as-code

Styra is Open Policy Agent’s big, enterprise brother for policy-as-code

Developers have more access to, and control over, compute resources than ever. Public cloud, infrastructure-as-code and cloud-native development and consumption models are great accelerators of what developers can achieve in short...
HashiCorp Vault Unlocking the Cloud Operating Model Security

Unlocking the Cloud Operating Model: Security

Understanding the security benefits that come with managing Identity and Secrets in a multi-cloud environment For many enterprises, the logistical realities of cloud adoption often requires a shift from a traditional on-premise...

SideScanning Technical Brief – Inside the Engine that Powers Orca Security

Delivered as SaaS, Orca’s SideScanning™ technology reads your cloud configuration and workloads’ runtime block storage out-of-band, giving you workload-level security across AWS, Azure, and GCP - without the gaps in coverage...
The-Ultimate-Guide-to-AWS,-Azure,-and-GCP-Cloud-Asset-Visibility

The Ultimate Guide to AWS, Azure, and GCP Cloud Asset Visibility

It’s no secret that cloud deployments are sky-rocketing globally, with organizations of all sizes and industries transitioning at least some of their infrastructure and assets to the cloud. Are visibility and...
Whitepaper Securing Kubernetes Workloads

Securing Kubernetes Workloads

Securing Kubernetes Workloads Why RBAC is not Enough for Intent-Based APIs Kubernetes has officially arrived - with a recent survey from the CNCF stating that 78% of enterprises are using it in production...
Why you must shift left security in the software development lifecycle

Why you must shift left security in the software development lifecycle

This is post 3 of 4 in the Amazic World series sponsored by GitLab 1. Toolchain tax: just the tip of the iceberg? 2. Why the Pipeline is key for Cloud Engineers 3. Changing...

New trends and buzzwords in the DevOps era: are you ready for 2021?

As the year 2020 comes to an end, it's nice to look back at the trends and hypes we got so far. It is even more exiting to see which trends...