<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=58103&amp;fmt=gif">
Skip to content
All posts

Sisyphus Revisited

Sisyphus-Revisited-just-sayin-shadow-softWorking in IT is not for the faint of heart. At times, your job can feel like the myth of Sisyphus, repeatedly pushing a boulder up a hill. Particularly when you are trying to make infrastructure changes without interrupting daily operations.

You know that Kubernetes can unlock incredible business altering change. Chick-fil-A famously deployed Kubernetes on the edge to expand restaurant capacity that drove year over year sales growth. Capital One used Kubernetes to gain market share as Covid shifted banking from physical locations to online transactions.

The problem is that bold and courageous change requires bold and courageous people. There will always be resistance. In fact, it’s some people’s responsibility to resist change. The folks in Security, Legal, Compliance will try to stop change because they don’t know how to think about Kubernetes. 

You need a 4C’s Security Framework to explain to them how you’re actually going to improve security and compliance and increase protection from Cloud to Cluster to Container to Code. But you need to be bold and courageous as you lead the process.

As we approach Memorial Day, it’s often inspiring to learn from great leaders:

“The most important thing I learned is that soldiers watch what their leaders do. You can give them classes and lecture them forever, but it is your personal example they will follow.” – General Colin Powell

While you are relaxing and recuperating over the long weekend, think about the example you want to set transforming your business and overcoming resistance. Kubernetes is hard but you don’t have to go it alone like Sisyphus.

Kubernetes Security Workshop

To help you avoid anxiety and build confidence in your Kubernetes environment, we created a 1.5 day Security Workshop to help you create (8) Environment Maps to systematically strip out attack vector risk and build in Layer 7 security.