Blog SecurityKeep in touch

Implementing Github authentication on Kubernetes with Dex
Discover a step-by-step guide for integrating GitHub SSO with OVH Cloud Kubernetes, utilizing Dex as an OIDC provider for unified access across tools like ArgoCD or Grafana.

Best practices for Kubernetes and network security
Discover 5 essential best practices to secure network communications in your Kubernetes clusters and protect your data from potential threats.

Our best practices to secure Kubernetes execution units
Discover our 6 best practices for securing Kubernetes execution units, which are crucial to safeguard your containerized applications.

5 best practices for Access Control in Kubernetes
Discover our 5 best practices for access control in Kubernetes in order to enforce security and prevent unauthorized access in your cluster.

What is Linkerd?
Kubernetes is a central component of infrastructures, so improving its security is important. Linkerd is a service mesh that provides security for Kubernetes.

Best security practices for your IT management
Discover 7 essential cloud security best practices for IT system management, drawn from Theodo Cloud's cybersecurity expertise.

7 best practices to secure your CI/CD
Secure CI/CD pipelines in the cloud. Best practices for code, infrastructure, and runner security. Mitigate DevOps risks.

Best practices for IAM in cloud environments
IAM is a complex subject in the cloud, this article addresses security best practices for access management.