Home Security Page 3

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Ten cloud migration barriers and how to tackle them

10 cloud migration barriers and how to tackle them

Winning teams at large enterprises adopt cloud technology at a rapid pace. This brings changes to 3 well-known aspects: people, process & technology. Despite good efforts, there are also departments that...
Let your Pods do the talking

Let your Pods do the talking

In this article, we'll let your Pods to the talking. Almost all applications deployed to Kubernetes need to access cloud-native resources sooner or later. The application might need to talk to an...
Is SOAR the key enabler of DevSecOps

Is SOAR the key enabler of DevSecOps?

It is hard to soar with the eagles when you work with turkeys was a saying we used to use in the army. In the realm of security, this has never...
Control plane

What is a Service Mesh and why do you need it?

Probably not a surprise for anyone in the DevOps world: monoliths are becoming microservices. However, new challenges arise. How to split them up based on business domains? When to separate the...
Risk Management in a DevOps world

Risk Management in a DevOps world

Every great new feature of the application you push to production provides an opportunity to increase the revenue of your organization. On the other hand, every commit and with it, every...
Has the Lastline been crossed, VMware add another company to the fold

Has the Lastline been crossed, VMware add another company to the fold

VMware must have found a pot of gold under the end of the rainbow recently, they have been splashing the cash again, their latest acquisition is yet another addition to their...
Embedding Continuous Security into the delivery pipeline

Embedding Continuous Security into the delivery pipeline

Many enterprises have successfully shifted to the cloud because they embraced the adoption of DevOps. Running their IT services in the cloud made it possible to implement DevOps processes in a...
Choose the right cloud provider: 7 considerations

Choose the right cloud provider: 7 considerations

Don't feel like reading? Listen to this article via the player below: Amazic · Choose The Right Cloud Provider: 7 Considerations It should be no surprise: cloud providers have quickly become the platform...
Meet-Pulumi-infrastructure-management-with-your-favorite-programming-language

Meet Pulumi: infrastructure management with your favorite programming language

Since Infrastructure as Code is now the defacto standard to set up and maintain infrastructure, the number of tools to do this and frameworks grows. Perhaps all organizations know CloudFormation for...
5 Principles for optimizing app performance in the cloud

Whitepaper: 5 Principles for optimizing app performance in the cloud

Speed and agility continue to be among the leading motives for enterprise cloud adoption, since slow has become unacceptable in this fast-paced world we live in. But as a DevOps practitioner tasked...