Blog SecurityKeep in touch
Your Kubernetes environments secured with Kyverno policies
Discover Kyverno! Theory, installation, then examples of use. Finally, the problems or limitations of the tool in a complex Kubernetes environment.
Azure Managed Identities to enforce the security of your platform
The management of credentials and secrets is always a challenge. Learn how to delegate this issue to Azure using Managed Identities.
Secure your Github Actions deployments on GCP with Identity Federation
Learn how you can manually set up Identity Federation, and how doing it with Terraform can allow Github Actions to access your GCP resources.
Secure your authentication to your data warehouse with SSO and Snowflake
You don’t know what kind of service you want to use for your data warehouse? Learn why you might consider using Snowflake with SSO!
Cluster admin role Kubernetes: the Role-based Access Control
Role-based Access control in Kubernetes will enable you to secure access to your cluster. Discover what is RBAC, how to use it and some tools!
The financial impacts of a cyber attack
Being able to recognize and above all anticipate the risks and financial stakes of a cyber attack is key to steering the IT strategy of your company.
Security of managed Kubernetes clusters (EKS, AKS, GKE)
Most Kubernetes clusters are vulnerable. We'll take a look at the vulnerabilities present in managed clusters, and how to guard against them.
Questions about cloud and security
If there is still some reluctance to move to the Cloud for security reasons, this article will answer the 5 most common questions!
Docker Kubernetes Security: build container images with img
The automatic docker image build in Kubernetes via CI is critical to the security of your infrastructure. Here's why and how to fix it.