Home Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Tips and tricks to secure containers for run-time environments

One of the core concepts of container security is to protect any system which runs containers. Especially when using a container orchestration tool and when running containers in production....
Container security the static part

Container security – the static part

In one of my previous articles I wrote about the concepts of container security from a business point of view. One of the topics to start with is to secure the...
Docker Desktop Enterprise is the best feature of Docker Enterprise 3 0

Docker Desktop Enterprise is the best feature of Docker Enterprise 3.0. Here’s why.

Docker released Enterprise 3.0, and Docker Desktop Enterprise is the big new thing in this release. Docker Desktop Enterprise, or DDE, extends the Docker Enterprise container platform to the developer's system...
A business view on container security

A business view on container security

Containers are hot and container security is booming. At present there are a lot of websites dedicated to this topic. It’s highly technical and the number of subtopics is very large....
Not running containers in production is a risk. Here’s why

Not running containers in production is a risk. Here’s why

Two simple questions to start your working day with: How many VMs do you use in production to host your applications? How many containers do you run in production? If you do...
HashiConf-EU-2019

Recap of HashiConf EU 2019 – going multi*

Did you enjoy HashiConf EU 2019 just as much as I did? The 3-day conference was great from the start on Monday 8th of July until the end at Wednesday 10th....
Sysdig converges monitoring and security

Sysdig converges monitoring and security

Why do we monitor production applications? We want to know if the applications we run in production are healthy, of course. Healthy is a matter of perspective But what does healthy mean? Most...
Containers Today 2019 recap by Wiebe de Roos

Containers Today 2019 recap by Wiebe de Roos

Containers Today recap by Wiebe de Roos - Containers Today 2019 has just ended. Hope you were there, just like me. This one-day event took place on June 27th in The...
2019 Container Adoption Survey whitepaper

2019 Container Adoption Survey

The 2019 Annual Container Adoption Survey sponsored by Portworx and Aqua Security features insights from over 500 IT professionals across a variety of industries and company sizes. The survey, conducted in...
5 surprising conclusions from the Portworx 2019 Container Adoption Survey

5 surprising conclusions from the Portworx 2019 Container Adoption Survey

The 2019 Annual Container Adoption Survey is sponsored by Portworx and Aqua Security. The report features insights from over 500 IT professionals across a variety of industries and company sizes. The...

Upcoming Training Courses

- Advertisement -