How zero-trust security principles can help your IT organization scale Kubernetes with confidence

Zero-Trust: Examining Security Practices for Kubernetes

In this article, we’ll explore how users can secure Kubernetes by discussing the four essential pillars for secure access to K8s, go over how zero-trust principles can be applied to Kubernetes, and look at best practices to create and maintain end-to-end zero-trust K8s environments across data centers, public clouds, and even the edge.

Collect data, analyze, and respond

Strategies for the Cloud Threat Hunter

Threat hunting, like all cloud security, is rendered additionally difficult by high volumes of transactions and the high velocity of deployments. Security professionals face constantly evolving landscapes as their company infrastructures change and cloud providers offer new tools. While standard and cloud threat modeling share basic methodologies and joint purposes, there are meaningful differences.

Interview with Paul Farrington, CPO at Glasswall

“File-based threats should not be underestimated”

We spoke with Paul Farrington, CPO at Glasswall about Content Disarm and Reconstruction technology, how it is used, and how it helps against file-based threats. Paul gives his advice regarding security measures, file-based threats, and how developers can best achieve top-notch security practices.

Overcome technical skills gaps and scale automation

Making DevSecOps an automated reality

It’s no secret that DevSecOps with its speedy delivery and reduction in risk can accelerate the pace of digital transformation. In this article, Michelle Sebek, Senior Product Marketing Manager at Progress discusses the role of DevSecOps in digital transformation and policy-based DevSecOps automation architecture.

Evolving with threats

From DevOps to FieldOps: Going beyond Secure by Design

In this article, Mike Nelson is the VP of IoT Security at DigiCert, discusses Secure By Design and IoT security after DevOps. The IoT needs to be Secure By Design – it’s an oft-repeated and fundamental best practice for IoT security. However – it’s not enough. Secure By Design is a necessary but insufficient step to reach the goal of a secure IoT.

Plan your EOL strategy

Understanding EOL OSS risks – and what to do

Deciding on software updates or migration plans when OSS community long-term support ends and just before going into EOL can be difficult and time-consuming. It is tempting to keep heads down and carry on working with EOL OSS in the hope that nothing will happen, or if it does, it is going to be someone else’s problem.

Promoting safer practices

Safer Internet Day 2022: A view from the experts

Safer Internet Day, held annually on 8th February, promotes safer practices and better safeguarding on the internet, covering a broad range of areas such as cyberbullying, cybercrime, and digital identity. Tech leaders at Pluralsight, Venari, Cradlepoint and Grayce weigh in on what businesses need to consider when it comes to online safety.

Lessons from the open source community

Collaboration in the cybersecurity industry: It’s time to start disrupting disruption

Effective collaboration is a simple yet effective tool in building resilience to better protect those who rely on cyber professionals to keep them, and their businesses, secure. How though, as we move forward, do we keep this sense of collaboration from waning, and ensure the community continues to share and tap into each other’s best practices to improve solutions and applications?