Evaluate the security level of my IT system

Evaluate the security level of my IT system

Understand the different methods of assessing the security level of your information system (IS), and the advantages and disadvantages of each!

How to encrypt data at rest with a Customer Managed Key with Terraform

How to encrypt data at rest with a Customer Managed Key with Terraform

Find out how to create a Customer-Managed Encryption Key (CMEK) with Terraform and use it to encrypt data at rest in some GCP services.

Your Kubernetes environments secured with Kyverno policies

Your Kubernetes environments secured with Kyverno policies

Discover Kyverno! Theory, installation, then examples of use. Finally, the problems or limitations of the tool in a complex Kubernetes environment.

Azure Managed Identities to enforce the security of your platform

Azure Managed Identities to enforce the security of your platform

The management of credentials and secrets is always a challenge. Learn how to delegate this issue to Azure using Managed Identities.

Secure your Github Actions deployments on GCP with Identity Federation

Secure your Github Actions deployments on GCP with Identity Federation

Learn how you can manually set up Identity Federation, and how doing it with Terraform can allow Github Actions to access your GCP resources.

Secure your authentication to your data warehouse with SSO and Snowflake

Secure your authentication to your data warehouse with SSO and Snowflake

You don’t know what kind of service you want to use for your data warehouse? Learn why you might consider using Snowflake with SSO!

Cluster admin role Kubernetes: the Role-based Access Control

Cluster admin role Kubernetes: the Role-based Access Control

Role-based Access control in Kubernetes will enable you to secure access to your cluster. Discover what is RBAC, how to use it and some tools!

The financial impacts of a cyber attack

The financial impacts of a cyber attack

Being able to recognize and above all anticipate the risks and financial stakes of a cyber attack is key to steering the IT strategy of your company.

Security of managed Kubernetes clusters (EKS, AKS, GKE)

Security of managed Kubernetes clusters (EKS, AKS, GKE)

Most Kubernetes clusters are vulnerable. We'll take a look at the vulnerabilities present in managed clusters, and how to guard against them.