Open Policy Agent at scale
Managing consistent, secure ands scalable rules across teams, clusters and clouds
With the rapid growth of cloud-native services and containerized applications, enterprises have been facing a quiet, universal and mounting crisis: there...
Unlocking the Cloud Operating Model: Security
Understanding the security benefits that come with managing Identity and Secrets in a multi-cloud environment
For many enterprises, the logistical realities of cloud adoption often requires a shift from a traditional on-premise...
SideScanning Technical Brief – Inside the Engine that Powers Orca Security
Delivered as SaaS, Orca’s SideScanning™ technology reads your cloud configuration and workloads’ runtime block storage out-of-band, giving you workload-level security across AWS, Azure, and GCP - without the gaps in coverage...
The Ultimate Guide to AWS, Azure, and GCP Cloud Asset Visibility
It’s no secret that cloud deployments are sky-rocketing globally, with organizations of all sizes and industries transitioning at least some of their infrastructure and assets to the cloud. Are visibility and...
Securing Kubernetes Workloads
Securing Kubernetes Workloads
Why RBAC is not Enough for Intent-Based APIs
Kubernetes has officially arrived - with a recent survey from the CNCF stating that 78% of enterprises are using it in production...
A beginner’s guide to GitOps and how it works
Infrastructure automation using DevOps best practices
As software applications become more sophisticated, the demands on infrastructure increase. Teams need to support complex deployments at immense scale and speed. GitOps is an operational...
Kubernetes Security via Admission Control
Kubernetes isn’t (just) fun and games anymore. It’s being rolled out for production; it’s mission-critical; and all the security and compliance rules and regulations of the old world need to somehow...
A seismic shift in application security
Application Security Testing has been around for a long time, yet applications continue to be a lucrative target for attackers.
Traditional application security tools were built for traditional development methods and struggle...
The benefits of single application CI/CD
Continuous Integration and Delivery (CI/CD) has changed the way we build, test, and deploy software. Releases that happened weekly, monthly, or more, can now be pushed several times a day.
In order...
Starting and Scaling DevOps in the Enterprise
Sharing his pioneering insight on how organizations can transform their software development and delivery processes, Gary Gruver provides a tactical framework to implement DevOps principles in "Starting and Scaling DevOps in...