Remove Applications Remove Load Balancer Remove Policies Remove Security
article thumbnail

DockerCon 2017 Black Belt Session: Cilium for Network and Application Security

Scott Lowe

This is a liveblog of the DockerCon 2017 Black Belt session led by Thomas Graf on Cilium , a new startup that focuses on using eBPF and XDP for network and application security. Why is it necessary to rethink how networking and security is handled? Why is it necessary to rethink how networking and security is handled?

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

In the fast-evolving world of finance, data security is of paramount importance. The Payment Card Industry Data Security Standard (PCI DSS) is a crucial framework to which financial institutions must adhere. This is where a Common Controls Assessment (CCA) can play a pivotal role.

Financial 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Changing the calculus of containers in the cloud

All Things Distributed

In our industry, four years is a long time, but I think we've only just started exploring how this combination of code packaging, well-designed workflows, and the cloud can reshape the ability of developers to quickly build applications and innovate. How do you define and group services into applications?

Cloud 148
article thumbnail

Technology Short Take 151

Scott Lowe

Aidan Steele examines how VPC sharing could potentially improve security and reduce cost. Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. Orca Security discusses the “Superglue” vulnerability in AWS Glue. Sander Rodenhuis wrote an article on security policies in Kubernetes.

article thumbnail

Technology Short Take 143

Scott Lowe

Here’s a quick look at using Envoy as a load balancer in Kubernetes. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. Operating Systems/Applications. I hope this collection of links has something useful for you! Networking.

article thumbnail

Azure Training Courses | New January Releases

Linux Academy

Configuring resource policies and alerts. Securing Storage with Access Keys and Shared Access Signatures in Microsoft Azure. Identity and security. Azure Storage Accounts: Configuration and Security. Create a Load Balanced VM Scale Set in Azure. Create and Configure an Application Gateway in Azure.

Course 80
article thumbnail

Weekly Update 5-20-2019

Linux Academy

Application streams. Improved security. For the Red Hat Certified Specialist in Security Prep course , we have the following hands-on labs: Configuring Audit Settings on Red Hat. Create a Custom Scan Policy with OpenSCAP. Configure an Account Lockout Policy. Configure a Password Complexity Policy.

Linux 60