Join us

ContentPosts tagged with Security..
Story
@boriszn shared a post, 3 years, 10 months ago
Senior Software and Cloud Architect, IBM, Nordcloud

Common Performance Management Mistakes

Azure Azure Kubernetes Service (AKS)

In the figure above, you can see that the AKS cluster contains nodes that are represented as virtual machines under the hood. The Autoscaler is the main component here. It scales up the node count when the cluster is under high load. It also scales the node down to a standard size when the cluster i..

3.2.jpeg
Dev Swag
@ByteVibe shared a product

404 Brain not Found - Developer T-Shirt

#developer  #merchandise  #swag 

Perfectly captures the feeling of being lost in thought! "404 Brain not Found" t-shirt comes with a bold and eye-catching design. This tee is sure to make a statement wherever you go. This tee sits ni...

Story
@magalix shared a post, 3 years, 10 months ago
Magalix

Identify IaC Violations and Revert Misconfigured Resources Using GitHub

Identifying violations in your infrastructure as code (and applications) by creating policy-as-code standards is a pathway to shifting your security left.

Identify IaC Violations and Revert Misconfigured Resources Using GitHub
Story
@magalix shared a post, 3 years, 11 months ago
Magalix

Top 5 Costly Data Breaches of 2021 and Its Impact

From Astoria Company to Reindeer, this article discusses the biggest data breaches of 2021 where the companies paid a huge price and suffered major repercussions

5costly-blogart.png
Ad
www.faun.dev shared an ad

#ad  #sponsored 
Story
@boriszn shared a post, 3 years, 11 months ago
Senior Software and Cloud Architect, IBM, Nordcloud

Mobile and IoT Security Strategies in the Cloud

Docker Azure Kubernetes Service (AKS)

ConclusionIn this article, I provided cases of secure IoT solutions, general principles of secure IoT architecture, and example workflows of secure IoT architectures based on Azure services, Google Cloud, and AWS.Boris Zaikin, Senior Software and Cloud Architect at Nordcloud GmbH@borisza on DZone | ..

iot-azure-air-1.jpeg
Story
@magalix shared a post, 3 years, 11 months ago
Magalix

Top GitOps Tactics to Build Secure Cloud-Native Infrastructure

- Why is GitOps Important?

- How Does GitOps Impact Cloud Security?

- What is Policy as Code?

Top GitOps Tactics to Build Secure Cloud-Native Infrastructure
Story
@vvickky007 shared a post, 3 years, 11 months ago
Architect, Ericsson

Security in Kubernetes Application Development

Docker Trivy Kubernetes Falco

Secure System Development Life Cycle is defined as the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly

1_mA6UPv0drVHSmoiq98GOmg.jpeg
News FAUN.dev() Team Trending
@devopslinks shared an update, 6 days, 8 hours ago
FAUN.dev()

MinIO Pulls Docker Images and Documentation - Community Calls Move "Malicious" and "Lock-In Strategy"

MinIO

MinIO transitions to a source-only distribution model, ending pre-compiled Docker images, sparking community concerns over security and feature removal.

MinIO GitHub Issue
Link
@soham2710 shared a link, 1 year ago
Founder, Botmartz IT Solutions

Top 10 LLM Security Companies of 2024

LLMs like ChatGPT and Gemini are transforming business operations but come with security risks such as data breaches and attacks. OWASP LLM Top 10 highlights key threats. This blog covers 10 security tools for LLM protection, including Repello AI, Lasso Security, Rebuff, and others. These tools focus on red teaming, code vulnerability, prompt injection, content moderation, data security, and AI governance to help organizations safeguard their AI systems.

Top 10 LLM Security Companies in 2024