Join us

ContentPosts tagged with Security..
Story
@boriszn shared a post, 3Ā years, 10Ā months ago
Senior Software and Cloud Architect, IBM, Nordcloud

Common Performance Management Mistakes

Azure Azure Kubernetes Service (AKS)

In the figure above, you can see that the AKS cluster contains nodes that are represented as virtual machines under the hood. The Autoscaler is the main component here. It scales up the node count when the cluster is under high load. It also scales the node down to a standard size when the cluster i..

3.2.jpeg
Dev Swag
@ByteVibe shared a product

I test in production - Heavy Blendā„¢ Hoodie

#developerĀ  #merchandiseĀ  #swagĀ 

This unisex heavy blend Hooded Sweatshirt is relaxation itself. It's made with a thick blend of Cotton and Polyester, which makes it plush, soft and warm. The spacious Kangaroo Pocket adds daily pract...

Story
@magalix shared a post, 3Ā years, 10Ā months ago
Magalix

Identify IaC Violations and Revert Misconfigured Resources Using GitHub

Identifying violations in your infrastructure as code (and applications) by creating policy-as-code standards is a pathway to shifting your security left.

Identify IaC Violations and Revert Misconfigured Resources Using GitHub
Ad
www.faun.dev shared an ad

#adĀ  #sponsoredĀ 
Story
@magalix shared a post, 3Ā years, 11Ā months ago
Magalix

Top 5 Costly Data Breaches of 2021 and Its Impact

From Astoria Company to Reindeer, this article discusses the biggest data breaches of 2021 where the companies paid a huge price and suffered major repercussions

5costly-blogart.png
Story
@boriszn shared a post, 3Ā years, 11Ā months ago
Senior Software and Cloud Architect, IBM, Nordcloud

Mobile and IoT Security Strategies in the Cloud

#Securit...Ā  #iotĀ  #cloudĀ  #dockerĀ 
Docker Azure Kubernetes Service (AKS)

ConclusionIn this article, I provided cases of secure IoT solutions, general principles of secure IoT architecture, and example workflows of secure IoT architectures based on Azure services, Google Cloud, and AWS.Boris Zaikin, Senior Software and Cloud Architect at Nordcloud GmbH@borisza on DZone | ..

iot-azure-air-1.jpeg
Story
@magalix shared a post, 3Ā years, 11Ā months ago
Magalix

Top GitOps Tactics to Build Secure Cloud-Native Infrastructure

- Why is GitOps Important?

- How Does GitOps Impact Cloud Security?

- What is Policy as Code?

Top GitOps Tactics to Build Secure Cloud-Native Infrastructure
Story
@vvickky007 shared a post, 4Ā years ago
Architect, Ericsson

Security in Kubernetes Application Development

Docker Trivy Kubernetes Falco

Secure System Development Life Cycle is defined as the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly

1_mA6UPv0drVHSmoiq98GOmg.jpeg
News FAUN.dev() Team Trending
@devopslinks shared an update, 2Ā weeks, 2Ā days ago
FAUN.dev()

MinIO Pulls Docker Images and Documentation - Community Calls Move "Malicious" and "Lock-In Strategy"

MinIO

MinIO transitions to a source-only distribution model, ending pre-compiled Docker images, sparking community concerns over security and feature removal.

MinIO GitHub Issue
Link
@soham2710 shared a link, 1Ā year ago
Founder, Botmartz IT Solutions

Top 10 LLM Security Companies of 2024

LLMs like ChatGPT and Gemini are transforming business operations but come with security risks such as data breaches and attacks. OWASP LLM Top 10 highlights key threats. This blog covers 10 security tools for LLM protection, including Repello AI, Lasso Security, Rebuff, and others. These tools focus on red teaming, code vulnerability, prompt injection, content moderation, data security, and AI governance to help organizations safeguard their AI systems.

Top 10 LLM Security Companies in 2024