Kubernetes is quickly becoming the go-to platform for container orchestration, and for a good reason. It allows organizations to deploy, scale, and manage containerized applications in a highly-available and resilient manner. However, as Kubernetes becomes more widely adopted, it’s important…
The first concern that comes to mind when we think about cloud computing is security. We can’t help it. This worry seems to be ingrained in the minds of many decision-makers in companies across the world, and there is a reason for it: If we can see it, we believe it is safe. We still believe this, even though many events – like the hacking of Target’s and Equifax’s on-premises data centers – have shown us otherwise.
Huge attacks that compromise the personal information of customers don’t just happen in a vacuum. Prevention is needed.
Microservices are becoming the de facto approach to how new applications are built today. Although there are many benefits to microservices, the security risks associated with microservices are growing faster than current security practices can handle. To understand why this…
If you’re in IT, the pressure to deliver new products and features is a reality. But how then do you manage security and compliance when it comes to DevOps? According to Symantec, a new Zero Day exploit was discovered every…
Recently our partner Elasticsearch released a new security product – Shield. What is Shield? Shield is the security product that plugs directly into Elasticsearch, easily adding enterprise-grade security to the ELK stack. Shield protects data with: Role-Based Access Control Authentication System Support …
Important message for all Shadow-Soft Zimbra customers subscribed to Zimbra forums notifications: The forums on www.zimbra.com were recently the target of an attack in which the main forum page was defaced and some personal data was potentially compromised. The personal data that…
Every good system administrator knows that you monitor errata publishings on your operating system and address vulnerabilities. Every good network administrator knows that you monitor usages of ports inbound and outbound from your firewall and only selectively enable services you…