Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Best Practices for Kubernetes Security

Kubernetes (K8s) and its expansive ecosystem of cloud-native technologies have revolutionized the way applications are built and run. While the adoption of Kubernetes has opened the door to big gains in business agility, scalability and efficiency, it also introduces complex new security challenges that affect platform engineers and developers alike.

Trustless Infrastructure: Securing Critical Assets with Teleport

The global pandemic and push for remote work are putting companies’ IT infrastructures at greater risk than before. This risk grows as infrastructure is scaled, and more people gain access to highly sensitive data, such as access keys to a valuable password vault. Another vulnerability is the use of passwords since they can also be compromised. To overcome these risks and protect critical infrastructure, the implementation of a zero-trust access solution is needed. But how can we accomplish that without slowing down engineers or adding administrative overhead?

Three Big Myths About Application Testing With SAST Tools

Static Application Security Testing (SAST) is one of the principal techniques for assessing the source code of applications to detect possible vulnerabilities. SAST enhances application security during the early stages of the development life cycle and plays an important role in shifting security left. However, there are quite a few myths that are often associated with implementing SAST security tools. Let’s run through the big three.

Introducing Styra Run: A New, Holistic Approach To Authorization For SaaS Developers

Modern SaaS applications power the world’s most iconic businesses, and with hundreds of billions of dollars of annual revenue at stake, speed to market without compromising secure operation and access control is essential. Authorization for multi-tenant SaaS applications enables end-users to control ‘who’ and ‘what’ can interact with the application.

Teleport Demo - 30 Minute Overview

0:00 Intro

1:00 Architecture Overview

3:00 Single Sign On Integration

5:00 Teleport Server Access

7:00 tsh and session recordings

9:00 Teleport App Access

11:00 RBAC Mapping

12:05 Teleport K8s Access

15:00 Teleport DB Access

18:00 Teleport RDP Access

22:00 Access Requests

24:00 Teleport Slackbot

26:00 Active Session Joining
27:00: Trusted Clusters

28:00 Open Source vs Enterprise

How to Deploy Pods in Kubernetes?

Kubernetes leverages various deployment objects to simplify the provisioning of resources and configuration of workloads running in containers. These objects include ReplicaSets, lSets, Sets, and Deployments. A pod is the smallest deployment unit in Kubernetes that usually represents one instance of the containerized application.

Team Up on DevSecOps with JFrog Platform App for Microsoft Teams

The JFrog DevOps Platform is your mission-critical tool for your software development pipelines. The results of key binary management events in Artifactory, Xray, and Distribution can reveal whether or not your software pipelines are on-track to deliver production-quality releases.

Kubescape: A Kubernetes open-source platfrom providing a multi-cloud Kubernetes single pane of glass

Kubescape is a Kubernetes open-source platform providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer, and image vulnerabilities scanning.

A Brief Guide to Cloud-Native Applications, Technology, and Security

What are cloud-native applications? According to the Cloud Native Computing Foundation (CNCF), the term “cloud native” describes systems that are specifically designed to help build and run scalable applications in all cloud environments, including public, private, and hybrid clouds. Cloud-native applications use the attributes of cloud architecture in ways that legacy systems can’t. They don’t need any onsite computing infrastructure and can scale quickly to meet demand.