Remove Applications Remove Firewall Remove Open Source Remove Operating Systems
article thumbnail

Technology Short Take 143

Scott Lowe

I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. This post on using SPIFFE/SPIRE, Kubernetes, and Envoy together shows how to implement mutual TLS (mTLS) for a simple application. Operating Systems/Applications.

article thumbnail

Technology Short Take 145

Scott Lowe

Well, let’s see…stuff on Envoy, network automation, network designs, M1 chips (and potential open source variants!), Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. Are open source M1-style chips a possibility?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 143

Scott Lowe

I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. This post on using SPIFFE/SPIRE, Kubernetes, and Envoy together shows how to implement mutual TLS (mTLS) for a simple application. Operating Systems/Applications.

article thumbnail

Technology Short Take 132

Scott Lowe

I think a fair number of folks may not be aware that the Nginx ingress controller for Kubernetes—both the community version and the Nginx-maintained open source version—do suffer from timeouts and errors resulting from changes in the back-end application’s list of endpoints (think pods being added or removed).

article thumbnail

All You Need to Know About VMI for Mobile Apps

Galido

VMI stands for Virtual Mobile Infrastructure and basically, it provides end users with a highly effective and an efficient way to have access to delicate mobile applications and information without much hassle. It creates virtual versions of mobile applications and sends them to a vast collection of devices.

Mobile 81
article thumbnail

Technology Short Take 136

Scott Lowe

This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Operating Systems/Applications. Compute safely.

Linux 60
article thumbnail

Technology Short Take 145

Scott Lowe

Well, let’s see…stuff on Envoy, network automation, network designs, M1 chips (and potential open source variants!), Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. Are open source M1-style chips a possibility?