Tag

Cybersecurity

Is Service Mesh right for your infrastructure?

Andrew Jenkins of Aspen Mesh identifies three deployment options with regards to how a Service Mesh delivers its services: As a sidecar that runs alongside your microservice containerAs a library that can be built into each of the microservicesAs an agent that sit in the container infrastructure and provide the service to all the containers...
Read More

The hidden costs of security breaches

The real cost of a security breach to your business is larger than many imagine. On the surface there is incredible expensive to recovering from breaches. What is often also at risk is the inestimable damage to company morale, brand reputation, and operations.
Read More

What DevOps trends to follow (and what to ignore)

Cut through the fluff and get to the heart of which DevOps trends are worth hitching your wagon (or budget) to in the coming years—and which should be marked with a hazard warning. From containers to chaos engineering, here are the DevOps trends to trash and the ones you'll want to go fanboy on."
Read More

Perimeter Breaches: The attack front you’re losing

Everything is data. Defining your perimeter is nearly impossible, which makes securing it even more tricky. Old strategies are obsolete. How do we navigate and protect our boundaries in an increasingly digital world?
Read More

PHP Remote Code Execution 0-Day Discovered in Real World CTF Exercise

When a security researcher found an unusual PHP script while solving an hCorem Capture the Flag task, it reveal hundreds of millions of users are vulnerable to attack. Learn the deep tech.
Read More

An Analog Approach to Secure Operations in Kubernetes

Security is not something you achieve. It's something you continually take care of and understand as constantly transforming. Here are our tips about your K8s cybersecurity
Read More
1 2 3 4
Show Buttons
Hide Buttons