article thumbnail

DockerCon 2017 Black Belt Session: Cilium for Network and Application Security

Scott Lowe

This is a liveblog of the DockerCon 2017 Black Belt session led by Thomas Graf on Cilium , a new startup that focuses on using eBPF and XDP for network and application security. Why is it necessary to rethink how networking and security is handled? The use of BPF allows Cilium to “rethink” how policy enforcement happens.

article thumbnail

Technology Short Take 151

Scott Lowe

Aidan Steele examines how VPC sharing could potentially improve security and reduce cost. Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. Orca Security discusses the “Superglue” vulnerability in AWS Glue. Sander Rodenhuis wrote an article on security policies in Kubernetes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

In the fast-evolving world of finance, data security is of paramount importance. The Payment Card Industry Data Security Standard (PCI DSS) is a crucial framework to which financial institutions must adhere. The Payment Card Industry Data Security Standard (PCI DSS) is a crucial framework to which financial institutions must adhere.

Financial 105
article thumbnail

Changing the calculus of containers in the cloud

All Things Distributed

They are an important, but incremental, step on the journey of being able to write code and have it run in the right place, with the right scale, with the right connections to other bits of code, and the right security and access controls. Container orchestration has always seemed to me to be very not cloud native.

Cloud 149
article thumbnail

Technology Short Take 143

Scott Lowe

Here’s a quick look at using Envoy as a load balancer in Kubernetes. Having recently needed to dig into Open Policy Agent (OPA) , I took renewed interest in this slightly older article by Chip Zoller that compares OPA/Gatekeeper with Kyverno. I hope this collection of links has something useful for you! Networking.

article thumbnail

4 Tips for Processing Real-Time Data

CIO Business Intelligence

To comply with government regulations and/or internal security policies, organizations may find it necessary to secure sensitive data on-premises. Technology such as load-balancing ensures that all resources in a cluster are doing approximately the same amount of work.

Data 115
article thumbnail

Azure Training Courses | New January Releases

Linux Academy

Configuring resource policies and alerts. Securing Storage with Access Keys and Shared Access Signatures in Microsoft Azure. Identity and security. Azure Storage Accounts: Configuration and Security. Create a Load Balanced VM Scale Set in Azure. Creating and configuring storage accounts. Hybrid cloud.

Course 80