article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO Business Intelligence

Today, many organizations are embracing the power of the public cloud by shifting their workloads to them. A recent study shows that 98% of IT leaders 1 have adopted a public cloud infrastructure. It is estimated by the end of 2023, 31% of organizations expect to run 75% of their workloads 2 in the cloud. 8 Complexity.

Cloud 135
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Rory McCune explains Kubernetes authentication.

Linux 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

All other needs, for example, authentication, encryption, log management, system configuration, would be treated the same—by using the architectural patterns available. Some of them not only can provide strong authentication, but also have the ability to be used as a secret repository.

Financial 105
article thumbnail

Technology Short Take 141

Scott Lowe

The collection of links shared below covers a fairly wide range of topics, from old Sun hardware to working with serverless frameworks in the public cloud. The first is a post on Cilium and F5 load balancer integration , while the second discusses implementing Kubernetes network policies with Cilium and Linkerd. Networking.

Vmware 60
article thumbnail

Using Kubeadm to Add New Control Plane Nodes with AWS Integration

Scott Lowe

cluster with AWS integration, I mentioned that I was still working out the details on enabling AWS integration (via the AWS cloud provider) while also using new functionality in kubeadm (specifically, the --experimental-control-plane flag) to make it easier to join new control plane nodes to the cluster. Additional Notes. x as well.

article thumbnail

Technology Short Take 102

Scott Lowe

Bernd Malmqvist talks about Avi Networks’ software-defined load balancing solution, including providing an overview of how to use Vagrant to test it yourself. Chris Hein shows how to use the Heptio Authenticator with kops to link Kubernetes cluster authentication to AWS IAM. Cloud Computing/Cloud Management.

article thumbnail

Technology Short Take #25

Scott Lowe

I think this three-part series on new network models for cloud computing ( part 1 , part 2 , and part 3 ), while almost a year old, is quite good. I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). Cloud Computing/Cloud Management. Definitely worth reading, in my view.

Storage 92