Remove Applications Remove Architecture Remove Load Balancer Remove Policies
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance. In practice, IT architectural patterns give architects the building blocks to design any IT solution.

Financial 104
article thumbnail

Technology Short Take 143

Scott Lowe

Here’s a quick look at using Envoy as a load balancer in Kubernetes. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. It’s a good starting point for thinking about operating your own active-active architecture. Networking.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 151

Scott Lowe

Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. Chris Evans revisits the discussion regarding Arm processor architectures in the public cloud. Sander Rodenhuis wrote an article on security policies in Kubernetes. Operating Systems/Applications. What do you think microsegmentation means ?

article thumbnail

Technology Short Take 143

Scott Lowe

Here’s a quick look at using Envoy as a load balancer in Kubernetes. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. It’s a good starting point for thinking about operating your own active-active architecture. Networking.

article thumbnail

Technology Short Take 144

Scott Lowe

This is an interesting deep dive into Intel’s “Ice Lake” Xeon SP architecture. Dan Lorenc’s article on policy and attestations does a great job of covering key concepts like signatures, attestations, and provenance. Operating Systems/Applications. —see this post for an explanation.). So useful.).

Linux 90
article thumbnail

Technology Short Take 144

Scott Lowe

This is an interesting deep dive into Intel’s “Ice Lake” Xeon SP architecture. Dan Lorenc’s article on policy and attestations does a great job of covering key concepts like signatures, attestations, and provenance. Operating Systems/Applications. —see this post for an explanation.). So useful.).

Linux 60
article thumbnail

Liveblog: How News UK Centralized Cloud Governance

Scott Lowe

This is a liveblog of the AWS re:Invent session titled “How News UK Centralized Cloud Governance Using Policy Management” (DEV306). Before they started their journey to the public cloud, News Corp ran a “global application assessment”—and Caldwell believes that this was critical to the success News Corp/News UK has seen so far.