Blog SecurityKeep in touch
Secure access to your tooling components with IAP in GKE
Learn how to control and secure access to your tooling components with Identity-Aware Proxy (IAP) in GKE.
How to create and set up Kubernetes (k8s) secrets?
A Kubernetes secret is a resource for safely storing small chunks of data such as ssl certificate and keys, database passwords or ssh keys.
AWS Cloudfront: how to configure a WAF on a CloudFront?
In this article, we'll look at howw to implement a WAF on AWS components such as CloudFront or API-gateway.
Secure your Azure cloud with a private hub and spoke infrastructure
Secure your Azure cloud with a private hub and spoke infrastructure with private endpoints, private DNS, Azure policy, and private DNS resolver.
Top 5 questions when deploying an intrusion detection system
There are still too many IDS implementation errors. Here are five questions to ask yourself when choosing the right solution!
Discover Falco on Kubenertes, a threat detection engine!
If you want to improve the security of your Kubernetes cluster managed by a cloud provider or on-premise, let's try Falco, a threat detection engine!
Secure and access easily your cloud infrastructure with SSH Bastion
Learn how to implement an SSH bastion host on the cloud with sshuttle for secure and encrypted access to internal resources. Read our guide now!
Vault on CI/CD pipelines to secure secrets
Protect your sensitive data by properly managing secrets in your GitLab CI/CD pipeline with Hashicorp Vault.
The sole purpose of SSL Certificates
The internet is a vast space. Your computer interacts with multiple other entities. SSL certificates play a key role in making the web a safer place.