Remove Firewall Remove Linux Remove Open Source Remove Security
article thumbnail

Technology Short Take 136

Scott Lowe

The content this time around seems to be a bit more security-focused, but I’ve still managed to include a few links in other areas. This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. Linux may be coming to the Apple M1 chip. Networking. Servers/Hardware.

Linux 60
article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

To ensure ongoing security site reliability engineers must work hand-in-hand with the CISO’s (Chief Information Security Officer) office to implement Kubernetes security. Kubernetes out-of-the-box doesn’t exactly default to a secure enterprise grade cluster. Implement Pod Security Policy. Server Hardening.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

DockerCon 2016 Vendor Meetings

Scott Lowe

Plumgrid is one of the primary commercial sponsors behind the IO Visor project , a Linux Foundation project, which leverages the extended Berkeley Packet Filter (eBPF) subsystem in the Linux kernel. Route aggregation is leveraged wherever possible, and Calico programs IPTables on each host to handle security policies.

Meeting 60
article thumbnail

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Matt Oswalt recently unveiled (and open sourced) a framework called ToDD, which stands for “Testing on Demand: Distributed”. You may also find this (related) article on memory inside Linux containers to be helpful.

Vmware 60
article thumbnail

What is Virtual Network Computing (VNC)?

Dataconomy

and the open-source community. This feature is particularly useful in environments where only HTTP traffic is allowed, such as in a web proxy or firewall. The VNC protocol also supports encryption of the VNC traffic, which is done using a secure variant of the VNC protocol known as VNC over Secure Shell (VNC over SSH).

article thumbnail

Technology Short Take #79

Scott Lowe

Skydive is (in the project’s own words) an “open source real-time network topology and protocols analyzer.” Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Here’s a walkthrough to install Arch Linux on VirtualBox.

Linux 60
article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Data Security—What’s New and What’s Next? Chief Security Architect, Office of the CTO, Cloudera. Security Spotlight: Focus on HIPAA and PCI Compliance. Chief Security Architect, Office of the CTO, Cloudera. Security and Compliance in the Era of Big Data. Chief Security Architect, Office of the CTO, Cloudera.