Join us

heart Posts from the community tagged with Security...
Story
@boriszn shared a post, 3 years, 3 months ago
Senior Software and Cloud Architect, IBM, Nordcloud

Common Performance Management Mistakes

In the figure above, you can see that the AKS cluster contains nodes that are represented as virtual machines under the hood. The Autoscaler is the main component here. It scales up the node count when the cluster is under high load. It also scales the node down to a standard size when the cluster i..

3.2.jpeg
Story
@magalix shared a post, 3 years, 3 months ago
Magalix

Identify IaC Violations and Revert Misconfigured Resources Using GitHub

Identifying violations in your infrastructure as code (and applications) by creating policy-as-code standards is a pathway to shifting your security left.

Identify IaC Violations and Revert Misconfigured Resources Using GitHub
Story
@magalix shared a post, 3 years, 3 months ago
Magalix

Top 5 Costly Data Breaches of 2021 and Its Impact

From Astoria Company to Reindeer, this article discusses the biggest data breaches of 2021 where the companies paid a huge price and suffered major repercussions

5costly-blogart.png
Story
@boriszn shared a post, 3 years, 4 months ago
Senior Software and Cloud Architect, IBM, Nordcloud

Mobile and IoT Security Strategies in the Cloud

ConclusionIn this article, I provided cases of secure IoT solutions, general principles of secure IoT architecture, and example workflows of secure IoT architectures based on Azure services, Google Cloud, and AWS.Boris Zaikin, Senior Software and Cloud Architect at Nordcloud GmbH@borisza on DZone | ..

iot-azure-air-1.jpeg
Story
@magalix shared a post, 3 years, 4 months ago
Magalix

Top GitOps Tactics to Build Secure Cloud-Native Infrastructure

- Why is GitOps Important?

- How Does GitOps Impact Cloud Security?

- What is Policy as Code?

Top GitOps Tactics to Build Secure Cloud-Native Infrastructure
Story
@vvickky007 shared a post, 3 years, 4 months ago
Architect, Ericsson

Security in Kubernetes Application Development

Secure System Development Life Cycle is defined as the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly

1_mA6UPv0drVHSmoiq98GOmg.jpeg
Link
@soham2710 shared a link, 5 months ago
Founder, Botmartz IT Solutions

Top 10 LLM Security Companies of 2024

LLMs like ChatGPT and Gemini are transforming business operations but come with security risks such as data breaches and attacks. OWASP LLM Top 10 highlights key threats. This blog covers 10 security tools for LLM protection, including Repello AI, Lasso Security, Rebuff, and others. These tools focus on red teaming, code vulnerability, prompt injection, content moderation, data security, and AI governance to help organizations safeguard their AI systems.

Top 10 LLM Security Companies in 2024