Cloud
Mastering the Art of Kubernetes Security
With Kubernetes’ explosive adoption by the development community comes an urgent need to secure K8s clusters and ensure their compliance effectively The post Mastering the Art of Kubernetes Security appeared first on ...
Enterprise considerations for implementing data encryption
Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to data encryption and enterprises must consider several ...
Who Owns Security in Multi-Cloud Operations?
The best-kept secret is the one that is never shared. In today’s technology environment, that is even more true. Where organizations used to build and maintain their own technology stacks, now they ...
A Totally Cloud-Biased Retrospective of RSAC 2023
I had a bit of a weird moment a few weeks before the RSA Conference. I was grumbling a bit about finishing my slides, which were late due to an agenda change, ...
A Totally Cloud-Biased Retrospective of RSAC 2023
I had a bit of a weird moment a few weeks before the RSA Conference. I was grumbling a bit about finishing my slides, which were late due to an agenda change, ...
Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume
How to do CWP right to prepare your organization and protect it from the next widespread vulnerability The post Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume appeared ...
Mapping the Changes in the IT/OT Landscape
Nothing in cybersecurity stays still for long 2022 intensified the Digital Transformation in OT (technology that interfaces with the physical world) and Industrial Control Systems (ICS) environments even further. Partially driven by ...
Don’t Get Burned (Out) by Cloud Vulnerabilities
As a cybersecurity professional, vulnerabilities and exploits can be exhausting, never-ending and the bane of your existence. It is hard to prioritize what matters to you and your organization when you are ...
Federating Kubernetes Workloads with Cloud Identities
Your K8s workloads legitimately need access to sensitive cloud resources – federated identities let you grant it easily and securely The post Federating Kubernetes Workloads with Cloud Identities appeared first on Ermetic ...
Navigating Cloud Security: Why Segregating Environments from Dev to Production is so Important
Segregation in cloud environments is important for security - this post explores why and offers best practice tips for acting on it. The post Navigating Cloud Security: Why Segregating Environments from Dev ...