Tag: Sponsored
-
The Kubernetes Network Security Effect
Kubernetes has a built-in object for managing network security: NetworkPolicy. While it allows the user to define the relationship between pods with ingress and egress policies, it is basic and requires very precise IP mapping of a solution …
-
Data Protection for VMware Tanzu — Freedom for Developers While IT Maintains Control
VMware Tanzu provides an easy way for organizations that already have a VMware base to adopt Kubernetes. Tanzu essentially is a …
-
Why Using a Time-Series Database Improves Security Monitoring
Security monitoring is complex. Successful implementation of a security monitoring infrastructure involves people, process, technology and …
-
Defense in Depth: The First Step to Security Certainty
Bad actors are constantly coming up with ways to evade defensive techniques put in place by government agencies, educational institutions, …
-
New Research Shows Secure Usage of Open Source Remains Problematic
If I told you that the average number of vulnerabilities in commercial software was up 93% in the past year, you’d start questioning my …
-
Why You Need to Implement a Cloud Native Data Protection Solution
Implementing a cloud native data protection solution assures your digital business team that their applications are safe and they can …
-
6 Talks That Developers Will Be Excited to See at Oktane21
On April 6-8, 2021, Okta will host its annual conference: …
-
Open Sourcing Cyber Defense to Level the Playing Field
The convergence of cloud-based open source tools makes it possible to pool together security expertise from a diverse community of novices …
-
Q&A: How VerticalChange Secures Sensitive Data Using Open Source Tools
VerticalChange web-based cloud platform is committed to serving the community. From the start, VerticalChange was designed to empower the …
-
A Bottom-Up Approach to 5G Network Slicing Security in User Equipment
Securing 5G UE products against cyber threats requires a “bottom-up” approach where security is an integral part of the design that …
-
A Security Comparison of Docker, CRI-O and Containerd
For additional security measures, image scanning and runtime protection can secure Kubernetes-based applications. During the transition, …
-
Addressing Security Throughout the Infrastructure DevOps Lifecycle
No, this isn’t another post about the Secure Development Lifecycle. This is a practical post on why and how to address cloud security at …
●●●