Home Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Container security the static part

Container security – the static part

In one of my previous articles I wrote about the concepts of container security from a business point of view. One of the topics to start with is to secure the...
Docker Desktop Enterprise is the best feature of Docker Enterprise 3 0

Docker Desktop Enterprise is the best feature of Docker Enterprise 3.0. Here’s why.

Docker released Enterprise 3.0, and Docker Desktop Enterprise is the big new thing in this release. Docker Desktop Enterprise, or DDE, extends the Docker Enterprise container platform to the developer's system...
A business view on container security

A business view on container security

Containers are hot and container security is booming. At present there are a lot of websites dedicated to this topic. It’s highly technical and the number of subtopics is very large....
Not running containers in production is a risk. Here’s why

Not running containers in production is a risk. Here’s why

Two simple questions to start your working day with: How many VMs do you use in production to host your applications? How many containers do you run in production? If you do...
HashiConf-EU-2019

Recap of HashiConf EU 2019 – going multi*

Did you enjoy HashiConf EU 2019 just as much as I did? The 3-day conference was great from the start on Monday 8th of July until the end at Wednesday 10th....
Sysdig converges monitoring and security

Sysdig converges monitoring and security

Why do we monitor production applications? We want to know if the applications we run in production are healthy, of course. Healthy is a matter of perspective But what does healthy mean? Most...
Containers Today 2019 recap by Wiebe de Roos

Containers Today 2019 recap by Wiebe de Roos

Containers Today recap by Wiebe de Roos - Containers Today 2019 has just ended. Hope you were there, just like me. This one-day event took place on June 27th in The...
2019 Container Adoption Survey whitepaper

2019 Container Adoption Survey

The 2019 Annual Container Adoption Survey sponsored by Portworx and Aqua Security features insights from over 500 IT professionals across a variety of industries and company sizes. The survey, conducted in...
5 surprising conclusions from the Portworx 2019 Container Adoption Survey

5 surprising conclusions from the Portworx 2019 Container Adoption Survey

The 2019 Annual Container Adoption Survey is sponsored by Portworx and Aqua Security. The report features insights from over 500 IT professionals across a variety of industries and company sizes. The...
Palo Alto to acquire TwistLock for undisclosed sum

Palo Alto Networks to acquire Twistlock for undisclosed sum

Santa Clara-based Palo Alto Networks has announced its intention to acquire Twistlock, a cloud-native cybersecurity software vendor for an undisclosed amount, rumoured to be in the hundreds of millions. Twistlock has raised...

Upcoming Training Courses

- Advertisement -