Remove 2017 Remove Load Balancer Remove Network Remove Security
article thumbnail

DockerCon 2017 Black Belt Session: Cilium for Network and Application Security

Scott Lowe

This is a liveblog of the DockerCon 2017 Black Belt session led by Thomas Graf on Cilium , a new startup that focuses on using eBPF and XDP for network and application security. Graf starts by talking about how BPF (specifically, extended BPF or eBPF) can be used to rethink how the Linux kernel handles network traffic.

article thumbnail

Technology Short Take 88

Scott Lowe

Networking. Romain Decker has an “under the hood” look at the VMware NSX load balancer. This graphical summary of the AWS Application Load Balancer (ALB) is pretty handy. Joel Knight shares how he’s tried to blog more in 2017. Sorry about that! Servers/Hardware. Nothing this time (sorry!).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 103

Scott Lowe

Networking. Andrew Martin has a write-up with security recommendations for your Kubernetes clusters. Check out these articles talking about IPVS-based in-cluster load balancing , CoreDNS , dynamic kubelet configuration , and resizing persistent volumes in Kubernetes. Bet you haven’t seen that term used in a while!)

article thumbnail

Liveblog: How News UK Centralized Cloud Governance

Scott Lowe

News UK is currently running 69% of their workloads in the public cloud, with an aim to hit 75% by July 2017. Kinsella now takes a moment to define governance, particuarly in terms of controlling cost, security, and compliance. Elastic Load Balancing left unused. Regular review of security groups. No tagging.

article thumbnail

Liveblog: IPv6 in the Cloud - Protocol and Service Overview

Scott Lowe

This is a liveblog of an AWS re:Invent 2017 breakout session titled “IPv6 in the Cloud: Protocol and Service Overview.” The Global Unicast Address (GUA), is a globally-unique address that allows IPv6-equipped workloads to communicate end-to-end without any network address translation (NAT).

IPv6 60
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. It kind of came on my radar somewhere around 2017. Stok: I went to DEF CON in 2017. and such.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. It kind of came on my radar somewhere around 2017. Stok: I went to DEF CON in 2017. and such.