Search results for: security audit


What is zero trust authorization?

Posted on October 25, 2024 | Twain Taylor

Member post originally published on Cerbos’s blog by Twain Taylor Traditional security models, which rely on perimeter-based defenses, have proven to be quite inadequate in the face of sophisticated attacks and the growing adoption of cloud…


Kubernetes CI/CD pipeline with Jenkins and Devtron

Posted on October 17, 2024 | Bhushan Nemade

Member post originally published on Devtron’s blog by Bhushan Nemade TL;DR: Build a powerful Kubernetes CI/CD pipeline using Jenkins and Devtron. In the previous blog on Jenkins, we already covered how to set up a Jenkins pipeline,…


Lockheed Martin

Posted on October 17, 2024

Getting Otel metrics flowing in minutes (literally) Three years ago, Lockheed Martin’s Enterprise Operations team knew something had to change. To keep the security and audit logs off the main systems they needed scalability but all…


Vonage

Posted on October 2, 2024


Kubernetes governance: the great policy for innovation

Posted on September 23, 2024

Member post by Kyuho Han, SK Telecom Background : Age of collaboration Since the World Economic Forum (WEF) 2021, The great reset of our society through digital transformation has been accelerating. In Korea, digital transformation is…


Mezmo

Posted on September 17, 2024

To satisfy critical customer requirements around data security, Mezmo investigated several service mesh options. After a detailed evaluation, Mezmo chose Linkerd for its simplicity and ease of use. Today, Mezmo operates Linkerd at significant scale in…


Deploy your first app on Kubernetes with GitOps

Posted on September 9, 2024

Member post originally published on the Taikun blog Introduction In the ever-evolving landscape of cloud-native technologies, managing deployments in Kubernetes clusters has become increasingly complex. Enter ArgoCD, a powerful tool that simplifies and automates the deployment…


Explain infrastructure as code (alternatives to IaC)

Posted on August 15, 2024 | Kunal Dabir

Member post originally published on AppCD’s blog by Kunal Dabir I was recently speaking with an SRE who, when asked for their opinion on Infrastructure as Code (IaC), shouted, “it’s terrible and our devs hate it!”…


The technical complexities of decoupled authorization

Posted on August 7, 2024

Member post originally published on the Cerbos blog by James Walker Decoupling authorization from your main application code makes authorization more scalable, easier to maintain, and simpler to integrate with your components. However, these benefits are…


Seznam

Posted on July 30, 2024

Adopting Cilium for High-Performance Load Balancing Seznam’s platform and infrastructure team, consisting of 20 members, collaborates to build, support, and operate their infrastructure for 700 developers. This infrastructure operates across three data centers and includes 10,000…