If SD-WAN gained traction for its flexible connectivity options, then SASE will be defined by its ability to seamlessly deliver full security to every edge on the network.
Blog
-
How to Seamlessly Apply FinOps on Your Growing Cloud Infrastructure Pursuing the perfect end-user experience, cloud services are incredibly easy to spin up, and much harder to restrain. None of us wants to be responsible for downtime just when business is booming. We therefore overprovision and overspend, making cloud computing, storage and networking services growing line items in our budgets
19th March, 2021 -
Kubeflow: Concepts, Use Cases and Starter’s Guide In this blog, I am going to cover the basics of Kuberflow, its use cases, and installation procedure.
17th March, 2021 -
FinOps Adoption as an Evolutionary Process An in-depth intro to FinOps adoption, team building, tooling, common challenges and their remediation.
17th March, 2021 -
The ROI of Playbooks-as-Code The only way businesses can guarantee service reliability at scale is to develop playbooks-as-code as mechanisms to make your systems more robust.
1st March, 2021 -
Attackers Use Automation – So Should You Bots are frequently used by hackers while they are performing reconnaissance against potential targets.
21st February, 2021 -
3 Reasons Why Excessive Permissions are Your #1 Cloud Threat Protecting against excessive permissions, and quickly responding when those permissions are abused, became the #1 priority for security administrators.
21st February, 2021 -
Most Cyber Attacks Follow These 6 Stages The biggest and most harmful attacks don’t happen in minutes, but rather unfold over months. They aren’t executed in a few clicks, but through a long process of exploration and exploitation. Here's how to better prepare for them.
21st February, 2021 -
Are Your DevOps Your Biggest Security Risk? How API Access Keys Risk Your Cloud Workloads Can publicly exposed API keys really lead to data breaches? How common are they in reality? And what, if anything, can be done against such exposure?
21st February, 2021 -
Stop Thinking Detection. Think Correlation Why security alerts are useless without proper context, and how to obtain it without sweating it.
21st February, 2021 -
4 Common Cloud Vulnerabilities that Lead to Data Breach 4 Common Cloud Vulnerabilities that Lead to Data Breach
18th February, 2021 -
AWS NAT Gateway and High-Availability NAT Instances with Auto-Scaling The basics of AWS Virtual Private Cloud (VPC), NAT Gateway, NAT Instances, and the working of a High-Availability version of NAT instance deployment.
10th February, 2021 -
The Implications of Elasticsearch and Kibana License Change from Apache 2.0 to SSPL The license change for Elasticsearch and Kibana, its implications on the opensource community and what it means for companies already using it.
10th February, 2021