article thumbnail

Configuration as code: securing the cloud

TM Forum

Thousands of settings must be maintained to establish policy for how employees authenticate and interact with company data. DevOps is the vehicle for which configuration as code gets deployed and has become vital to the cloud movement. Adopting the DevOps approach requires significant cultural and process change.

Cloud 130
article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

In November 2022, cybercriminals somehow acquired the right to run ads on Google for the popular open-source graphics editor GIMP. Ad blockers are worthwhile as long as they are backed by proper ethics and DevOps security best practices. It's also imperative to verify website authenticity before interacting with its content.

article thumbnail

Technology Short Take #59

Scott Lowe

Micro-segmentation is one of those terms (like SDN, cloud, DevOps, etc.) VMware open-sourced an identity and access management service called Lightwave ( project web site , GitHub repo ). First, I read this article by Chris Dent on his viewpoint that persistent IRC connectivity/use is actually harmful to open source communities.

Vmware 60
article thumbnail

Technology Short Take #59

Scott Lowe

Micro-segmentation is one of those terms (like SDN, cloud, DevOps, etc.) VMware open-sourced an identity and access management service called Lightwave ( project web site , GitHub repo ). First, I read this article by Chris Dent on his viewpoint that persistent IRC connectivity/use is actually harmful to open source communities.

Devops 60
article thumbnail

Technology Short Take 125

Scott Lowe

This blending of “traditional” network engineering with containers, Linux, and DevOps tooling is how Matt is setting new trends and directions for the networking industry. Chris Wahl touches on the topic of using GitHub personal tokens to authenticate to HashiCorp Vault. Servers/Hardware. Nothing this time around.

Linux 60
article thumbnail

Two Reasons Why Apache Cassandra Is the Database for Real-Time Applications

CIO Business Intelligence

The open source NoSQL database Apache Cassandra ® has two defining characteristics that make it perfectly suited to meet these needs: it’s geographically distributed, and it can respond to spikes in traffic without adverse effects to its unmatched throughput and low latency. Learn more about DataStax here.