Home Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

2019 Container Adoption Survey whitepaper

2019 Container Adoption Survey

The 2019 Annual Container Adoption Survey sponsored by Portworx and Aqua Security features insights from over 500 IT professionals across a variety of industries and company sizes. The survey, conducted in...
Not running containers in production is a risk. Here’s why

Not running containers in production is a risk. Here’s why

Two simple questions to start your working day with: How many VMs do you use in production to host your applications? How many containers do you run in production? If you do...
A business view on container security

A business view on container security

Containers are hot and container security is booming. At present there are a lot of websites dedicated to this topic. It’s highly technical and the number of subtopics is very large....
5 surprising conclusions from the Portworx 2019 Container Adoption Survey

5 surprising conclusions from the Portworx 2019 Container Adoption Survey

The 2019 Annual Container Adoption Survey is sponsored by Portworx and Aqua Security. The report features insights from over 500 IT professionals across a variety of industries and company sizes. The...
Container security the static part

Container security – the static part

In one of my previous articles I wrote about the concepts of container security from a business point of view. One of the topics to start with is to secure the...
Palo Alto to acquire TwistLock for undisclosed sum

Palo Alto Networks to acquire Twistlock for undisclosed sum

Santa Clara-based Palo Alto Networks has announced its intention to acquire Twistlock, a cloud-native cybersecurity software vendor for an undisclosed amount, rumoured to be in the hundreds of millions. Twistlock has raised...
Running Containers in Production for Dummies

Running Containers in Production for Dummies

The acclaimed For Dummies Series, this fantastic resource explores containers, orchestrator choices and helps you skillfully navigate the challenges of deploying containerized applications in production. Read it now!
Docker Desktop Enterprise is the best feature of Docker Enterprise 3 0

Docker Desktop Enterprise is the best feature of Docker Enterprise 3.0. Here’s why.

Docker released Enterprise 3.0, and Docker Desktop Enterprise is the big new thing in this release. Docker Desktop Enterprise, or DDE, extends the Docker Enterprise container platform to the developer's system...

What Compliance-as-Code means for your business

Have you already heard of Compliance-as-Code? Are you familiar with “compliance officers” in your organization? If not, you might be curious what 'compliance' means. Quite recently there have been some talks...
Interview with Chris Kranz and Why Sysdig

Interview with Chris Kranz – Why Sysdig

Part one of an Interview with Chris Kranz the EMEA SE Manager of Sysdig. we investigate the why, what and futures of sysdig.

Upcoming Training Courses

- Advertisement -