Home Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Shadow IT

Coming out of the dark – what is shadow IT and how to deal...

Everyone who works in a large organization knows it: there are (probably) a lot of IT projects that are not officially sanctioned. Although not a new phenomenon, it is important to...

Do we still need architecture in a DevOps world?

Modern IT architecture, with all the layers of abstraction, is difficult. It also seems like every couple of months a brand new shiny thing pops up out of Silicon Valley, Seattle,...
The App Factory A slow movement towards rapid change

The App Factory: A slow movement towards rapid change

Download this whitepaper to learn how to remove silos and increase visibility. As the increasing need for dependable applications proliferates across nearly every industry, many organizations rush to release apps that do...
Sysdig converges monitoring and security

Sysdig converges monitoring and security

Why do we monitor production applications? We want to know if the applications we run in production are healthy, of course. Healthy is a matter of perspective But what does healthy mean? Most...
HashiCorp Vault Unlocking the Cloud Operating Model Security

Unlocking the Cloud Operating Model: Security

Understanding the security benefits that come with managing Identity and Secrets in a multi-cloud environment For many enterprises, the logistical realities of cloud adoption often requires a shift from a traditional on-premise...
Going serverless

Going serverless: considerations for your organization

One of the latest cloud computing trends is to use serverless computing for deploy software applications. But what is serverless? In short: organizations do not maintain Virtual Machines or containers anymore....
Runtime security with Sysdig Falco

Runtime security with Sysdig Falco

Lately I've been researching possibilities to detect anomalies during runtime in containers. I came across the open source project Sysdig Falco which seems to do just that. Quoted from their site:...
Containers Today 2019 recap by Wiebe de Roos

Containers Today 2019 recap by Wiebe de Roos

Containers Today recap by Wiebe de Roos - Containers Today 2019 has just ended. Hope you were there, just like me. This one-day event took place on June 27th in The...
Photo by Matthew Henry on Unsplash

Useful things you need to know about system hardening

Since Dev and Ops related activities blend together in a DevOps world, developers need to understand more than just coding their application. Their role also includes typical Ops work: packaging and...

SideScanning Technical Brief – Inside the Engine that Powers Orca Security

Delivered as SaaS, Orca’s SideScanning™ technology reads your cloud configuration and workloads’ runtime block storage out-of-band, giving you workload-level security across AWS, Azure, and GCP - without the gaps in coverage...