Search results for: security audit


Vonage

Posted on October 2, 2024


Kubernetes governance: the great policy for innovation

Posted on September 23, 2024

Member post by Kyuho Han, SK Telecom Background : Age of collaboration Since the World Economic Forum (WEF) 2021, The great reset of our society through digital transformation has been accelerating. In Korea, digital transformation is…


Mezmo

Posted on September 17, 2024

To satisfy critical customer requirements around data security, Mezmo investigated several service mesh options. After a detailed evaluation, Mezmo chose Linkerd for its simplicity and ease of use. Today, Mezmo operates Linkerd at significant scale in…


Deploy your first app on Kubernetes with GitOps

Posted on September 9, 2024

Member post originally published on the Taikun blog Introduction In the ever-evolving landscape of cloud-native technologies, managing deployments in Kubernetes clusters has become increasingly complex. Enter ArgoCD, a powerful tool that simplifies and automates the deployment…


Explain infrastructure as code (alternatives to IaC)

Posted on August 15, 2024 | Kunal Dabir

Member post originally published on AppCD’s blog by Kunal Dabir I was recently speaking with an SRE who, when asked for their opinion on Infrastructure as Code (IaC), shouted, “it’s terrible and our devs hate it!”…


The technical complexities of decoupled authorization

Posted on August 7, 2024

Member post originally published on the Cerbos blog by James Walker Decoupling authorization from your main application code makes authorization more scalable, easier to maintain, and simpler to integrate with your components. However, these benefits are…


Seznam

Posted on July 30, 2024

Adopting Cilium for High-Performance Load Balancing Seznam’s platform and infrastructure team, consisting of 20 members, collaborates to build, support, and operate their infrastructure for 700 developers. This infrastructure operates across three data centers and includes 10,000…


Lessons from CrowdStrike’s buggy update: the critical importance of robust release processes

Posted on July 19, 2024

Community post by Andrés Vega, M42 and Technical Leader, CNCF TAG Security Recent events involving CrowdStrike’s Falcon security software have underscored a critical lesson across the industry: the importance of having a robust, secure release process….


Mastering DevSecOps with Devtron: a strategic approach

Posted on June 20, 2024

Member post originally published on the Devtron blog by Nishant As the adoption of Kubernetes continues to grow, organizations encounter numerous challenges in securing their software development and deployment processes. Integrating security practices into DevOps, known…


CNCF On demand webinar: Zero trust in practice with Istio and Kyverno

Posted on June 20, 2024

As cyber threats continue to grow in number and complexity, it’s becoming increasingly important to adopt security measures that can keep up. One such approach is Zero Trust (NIST SP800-207*), a security model that assumes the…