Join us

heart Posts from the community tagged with Security...
Sponsored Link FAUN Team
@faun shared a link, 1 year, 1 month ago

Read CloudNative Weekly Newsletter

CloudNative Weekly Newsletter, The Chief I/O. Curated CloudNative news, tutorials, tools and more!

Join thousands of other readers, 100% free, unsubscribe anytime.

Story
@boriszn shared a post, 2 years, 4 months ago
Senior Software and Cloud Architect, IBM, Nordcloud

Common Performance Management Mistakes

In the figure above, you can see that the AKS cluster contains nodes that are represented as virtual machines under the hood. The Autoscaler is the main component here. It scales up the node count when the cluster is under high load. It also scales the node down to a standard size when the cluster i..

3.2.jpeg
Story
@magalix shared a post, 2 years, 4 months ago
Magalix

Identify IaC Violations and Revert Misconfigured Resources Using GitHub

Identifying violations in your infrastructure as code (and applications) by creating policy-as-code standards is a pathway to shifting your security left.

Identify IaC Violations and Revert Misconfigured Resources Using GitHub
Story
@magalix shared a post, 2 years, 4 months ago
Magalix

Top 5 Costly Data Breaches of 2021 and Its Impact

From Astoria Company to Reindeer, this article discusses the biggest data breaches of 2021 where the companies paid a huge price and suffered major repercussions

5costly-blogart.png
Story
@boriszn shared a post, 2 years, 5 months ago
Senior Software and Cloud Architect, IBM, Nordcloud

Mobile and IoT Security Strategies in the Cloud

ConclusionIn this article, I provided cases of secure IoT solutions, general principles of secure IoT architecture, and example workflows of secure IoT architectures based on Azure services, Google Cloud, and AWS.Boris Zaikin, Senior Software and Cloud Architect at Nordcloud GmbH@borisza on DZone | ..

iot-azure-air-1.jpeg
Story
@magalix shared a post, 2 years, 5 months ago
Magalix

Top GitOps Tactics to Build Secure Cloud-Native Infrastructure

- Why is GitOps Important?

- How Does GitOps Impact Cloud Security?

- What is Policy as Code?

Top GitOps Tactics to Build Secure Cloud-Native Infrastructure
Story
@vvickky007 shared a post, 2 years, 5 months ago
Architect, Ericsson

Security in Kubernetes Application Development

Secure System Development Life Cycle is defined as the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly

1_mA6UPv0drVHSmoiq98GOmg.jpeg