Home Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

Interview with Chris Kranz and Why Sysdig

Interview with Chris Kranz – Why Sysdig

Part one of an Interview with Chris Kranz the EMEA SE Manager of Sysdig. we investigate the why, what and futures of sysdig.

What Compliance-as-Code means for your business

Have you already heard of Compliance-as-Code? Are you familiar with “compliance officers” in your organization? If not, you might be curious what 'compliance' means. Quite recently there have been some talks...
A business view on container security

A business view on container security

Containers are hot and container security is booming. At present there are a lot of websites dedicated to this topic. It’s highly technical and the number of subtopics is very large....
Sysdig converges monitoring and security

Sysdig converges monitoring and security

Why do we monitor production applications? We want to know if the applications we run in production are healthy, of course. Healthy is a matter of perspective But what does healthy mean? Most...
Container security the static part

Container security – the static part

In one of my previous articles I wrote about the concepts of container security from a business point of view. One of the topics to start with is to secure the...
5 surprising conclusions from the Portworx 2019 Container Adoption Survey

5 surprising conclusions from the Portworx 2019 Container Adoption Survey

The 2019 Annual Container Adoption Survey is sponsored by Portworx and Aqua Security. The report features insights from over 500 IT professionals across a variety of industries and company sizes. The...
Docker Desktop Enterprise is the best feature of Docker Enterprise 3 0

Docker Desktop Enterprise is the best feature of Docker Enterprise 3.0. Here’s why.

Docker released Enterprise 3.0, and Docker Desktop Enterprise is the big new thing in this release. Docker Desktop Enterprise, or DDE, extends the Docker Enterprise container platform to the developer's system...
Running Containers in Production for Dummies

Running Containers in Production for Dummies

The acclaimed For Dummies Series, this fantastic resource explores containers, orchestrator choices and helps you skillfully navigate the challenges of deploying containerized applications in production. Read it now!
Palo Alto to acquire TwistLock for undisclosed sum

Palo Alto Networks to acquire Twistlock for undisclosed sum

Santa Clara-based Palo Alto Networks has announced its intention to acquire Twistlock, a cloud-native cybersecurity software vendor for an undisclosed amount, rumoured to be in the hundreds of millions. Twistlock has raised...

Tips and tricks to secure containers for run-time environments

One of the core concepts of container security is to protect any system which runs containers. Especially when using a container orchestration tool and when running containers in production....

Upcoming Training Courses

- Advertisement -