<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Padok security</title>
    <link>https://security.theodo.com/en/blog</link>
    <description>Padok Security experts share their cybersecurity knowledge with you: cloud and Kubernetes security, DevSecOps, pentest ...</description>
    <language>en</language>
    <pubDate>Thu, 28 Nov 2024 13:00:00 GMT</pubDate>
    <dc:date>2024-11-28T13:00:00Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Kubernetes and network security best practices | Theodo Cloud Security</title>
      <link>https://security.theodo.com/en/blog/kubernetes-network-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/kubernetes-network-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/kubernetes-network-security.webp" alt="kubernetes-network-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why do I need to secure network communications in Kubernetes ?&lt;/h3&gt; 
&lt;p&gt;You need to secure network communications in Kubernetes to keep your data safe, protect your information, and keep your system secure. It's about safeguarding your data and keeping your Kubernetes setup trustworthy.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/kubernetes-network-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/kubernetes-network-security.webp" alt="kubernetes-network-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why do I need to secure network communications in Kubernetes ?&lt;/h3&gt; 
&lt;p&gt;You need to secure network communications in Kubernetes to keep your data safe, protect your information, and keep your system secure. It's about safeguarding your data and keeping your Kubernetes setup trustworthy.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Fkubernetes-network-security&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Kubernetes</category>
      <category>Best practices</category>
      <pubDate>Thu, 28 Nov 2024 13:00:00 GMT</pubDate>
      <author>alexandreh@padok.fr (Alexandre Hervé)</author>
      <guid>https://security.theodo.com/en/blog/kubernetes-network-security</guid>
      <dc:date>2024-11-28T13:00:00Z</dc:date>
    </item>
    <item>
      <title>How to secure Kubernetes executions units | Theodo Cloud Security</title>
      <link>https://security.theodo.com/en/blog/secure-kubernetes-executions-units</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/secure-kubernetes-executions-units" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/kubernetes%20security.webp" alt="How to secure Kubernetes executions units | Theodo Cloud Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why do we need to secure Kubernetes execution units?&lt;/h3&gt; 
&lt;p&gt;As the most famous container orchestrator, Kubernetes must be well-secured because it is a target choice for hackers. They could escape from a container to gain more access and full access to your cluster. As a cybersecurity engineer, you must protect your pods and nodes from these threats. Whether you're a SecOps professional, a CTO, or a manager, these recommendations are crucial to safeguard your containerized applications.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/secure-kubernetes-executions-units" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/kubernetes%20security.webp" alt="How to secure Kubernetes executions units | Theodo Cloud Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why do we need to secure Kubernetes execution units?&lt;/h3&gt; 
&lt;p&gt;As the most famous container orchestrator, Kubernetes must be well-secured because it is a target choice for hackers. They could escape from a container to gain more access and full access to your cluster. As a cybersecurity engineer, you must protect your pods and nodes from these threats. Whether you're a SecOps professional, a CTO, or a manager, these recommendations are crucial to safeguard your containerized applications.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Fsecure-kubernetes-executions-units&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Kubernetes</category>
      <category>Best practices</category>
      <pubDate>Thu, 28 Nov 2024 09:59:19 GMT</pubDate>
      <author>clementf@padok.fr (Clément Fages)</author>
      <guid>https://security.theodo.com/en/blog/secure-kubernetes-executions-units</guid>
      <dc:date>2024-11-28T09:59:19Z</dc:date>
    </item>
    <item>
      <title>Kubernetes Access Control: Cloud Security Essentials ⎮ Theodo Security</title>
      <link>https://security.theodo.com/en/blog/kubernetes-access-control</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/kubernetes-access-control" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/cybersecurity-access-control-kubernetes.webp" alt="Kubernetes Access Control: Cloud Security Essentials ⎮ Theodo Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why do we need access control in Kubernetes?&lt;/h3&gt; 
&lt;p&gt;Access control in Kubernetes is essential to enforce security and prevent unauthorized access. It ensures that only authenticated and authorized users or entities can interact with the Kubernetes cluster's resources. Without access control, there is a higher risk of data breaches and malicious activities within the cluster. In Kubernetes, it is crucial to implement it for maintaining the confidentiality, integrity, and availability of containerized applications.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/kubernetes-access-control" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/cybersecurity-access-control-kubernetes.webp" alt="Kubernetes Access Control: Cloud Security Essentials ⎮ Theodo Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why do we need access control in Kubernetes?&lt;/h3&gt; 
&lt;p&gt;Access control in Kubernetes is essential to enforce security and prevent unauthorized access. It ensures that only authenticated and authorized users or entities can interact with the Kubernetes cluster's resources. Without access control, there is a higher risk of data breaches and malicious activities within the cluster. In Kubernetes, it is crucial to implement it for maintaining the confidentiality, integrity, and availability of containerized applications.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Fkubernetes-access-control&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Kubernetes</category>
      <category>Best practices</category>
      <pubDate>Mon, 04 Nov 2024 14:53:41 GMT</pubDate>
      <author>clementf@padok.fr (Clément Fages)</author>
      <guid>https://security.theodo.com/en/blog/kubernetes-access-control</guid>
      <dc:date>2024-11-04T14:53:41Z</dc:date>
    </item>
    <item>
      <title>Linkerd: what is it? | Theodo Cloud Security</title>
      <link>https://security.theodo.com/en/blog/linkerd-what-is-it</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/linkerd-what-is-it" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/explainig-linkerd.webp" alt="explianing-linkerd" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Explaining Linkerd&lt;/h3&gt; 
&lt;p&gt;In this article, I will discuss the first steps in &lt;strong&gt;understanding Linkerd&lt;/strong&gt; and &lt;strong&gt;setting it up on a Kubernetes cluster&lt;/strong&gt;.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/linkerd-what-is-it" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/explainig-linkerd.webp" alt="explianing-linkerd" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Explaining Linkerd&lt;/h3&gt; 
&lt;p&gt;In this article, I will discuss the first steps in &lt;strong&gt;understanding Linkerd&lt;/strong&gt; and &lt;strong&gt;setting it up on a Kubernetes cluster&lt;/strong&gt;.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Flinkerd-what-is-it&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Technology</category>
      <pubDate>Thu, 17 Oct 2024 12:00:00 GMT</pubDate>
      <author>alexandre.barbier@theodo.com (Alexandre Barbier)</author>
      <guid>https://security.theodo.com/en/blog/linkerd-what-is-it</guid>
      <dc:date>2024-10-17T12:00:00Z</dc:date>
    </item>
    <item>
      <title>IT Management | Best Practices | Theodo Cloud Security</title>
      <link>https://security.theodo.com/en/blog/it-management</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/it-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/it-management-security.webp" alt="it-management-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;What are the main reasons for securing its infrastructure?&lt;/h3&gt; 
&lt;p&gt;The primary reasons to secure infrastructure are to protect sensitive data and intellectual property from unauthorized access, theft, or tampering, and to maintain business continuity by mitigating the risk of costly disruptions and reputational damage resulting from security breaches.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/it-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/it-management-security.webp" alt="it-management-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;What are the main reasons for securing its infrastructure?&lt;/h3&gt; 
&lt;p&gt;The primary reasons to secure infrastructure are to protect sensitive data and intellectual property from unauthorized access, theft, or tampering, and to maintain business continuity by mitigating the risk of costly disruptions and reputational damage resulting from security breaches.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Fit-management&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security</category>
      <category>Best practices</category>
      <pubDate>Thu, 03 Oct 2024 12:00:00 GMT</pubDate>
      <author>clementf@padok.fr (Clément Fages)</author>
      <guid>https://security.theodo.com/en/blog/it-management</guid>
      <dc:date>2024-10-03T12:00:00Z</dc:date>
    </item>
    <item>
      <title>The best practices to secure your CI/CD | Theodo Cloud Security</title>
      <link>https://security.theodo.com/en/blog/secure-ci-cd</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/secure-ci-cd" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/secure-ci-cd.webp" alt="secure-ci-cd" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why should I worry about my CI/CD security?&lt;/h3&gt; 
&lt;p&gt;In today's fast-paced software development world, &lt;span style="font-weight: bold;"&gt;Continuous Integration and Continuous Deployment (CI/CD) pipelines&lt;/span&gt; have become essential for delivering high-quality software quickly and efficiently. However, as these pipelines often interact with cloud resources and sensitive data, it's crucial to implement robust security measures.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/secure-ci-cd" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/secure-ci-cd.webp" alt="secure-ci-cd" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why should I worry about my CI/CD security?&lt;/h3&gt; 
&lt;p&gt;In today's fast-paced software development world, &lt;span style="font-weight: bold;"&gt;Continuous Integration and Continuous Deployment (CI/CD) pipelines&lt;/span&gt; have become essential for delivering high-quality software quickly and efficiently. However, as these pipelines often interact with cloud resources and sensitive data, it's crucial to implement robust security measures.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Fsecure-ci-cd&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Best practices</category>
      <pubDate>Thu, 19 Sep 2024 12:00:00 GMT</pubDate>
      <author>annefloref@padok.fr (Anne-Flore François)</author>
      <guid>https://security.theodo.com/en/blog/secure-ci-cd</guid>
      <dc:date>2024-09-19T12:00:00Z</dc:date>
    </item>
    <item>
      <title>IAM role configuration: best practices | Theodo Cloud Security</title>
      <link>https://security.theodo.com/en/blog/iam-role-configuration</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/iam-role-configuration" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/secure-repositories-1.webp" alt="security-IAM-cloud" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why is Access management in IAM so essential to secure your infra?&lt;/h3&gt; 
&lt;p&gt;IAM is a cornerstone of a robust cybersecurity strategy, providing the means to manage, monitor, and control user access to critical resources. It plays a central role in safeguarding infrastructure, preventing unauthorized access, and ensuring &lt;strong&gt;security policies are consistently enforced.&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/iam-role-configuration" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/secure-repositories-1.webp" alt="security-IAM-cloud" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why is Access management in IAM so essential to secure your infra?&lt;/h3&gt; 
&lt;p&gt;IAM is a cornerstone of a robust cybersecurity strategy, providing the means to manage, monitor, and control user access to critical resources. It plays a central role in safeguarding infrastructure, preventing unauthorized access, and ensuring &lt;strong&gt;security policies are consistently enforced.&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Fiam-role-configuration&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Technology</category>
      <category>Best practices</category>
      <pubDate>Thu, 05 Sep 2024 12:15:19 GMT</pubDate>
      <author>antoinea@padok.fr (Antoine Ansari)</author>
      <guid>https://security.theodo.com/en/blog/iam-role-configuration</guid>
      <dc:date>2024-09-05T12:15:19Z</dc:date>
    </item>
    <item>
      <title>Secure your repositories: 7 best practices | Theodo Cloud Security</title>
      <link>https://security.theodo.com/en/blog/secure-repositories</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/secure-repositories" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/secure-repositories.webp" alt="secure-repositories" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why is it essential to protect my repositories?&lt;/h3&gt; 
&lt;p&gt;&lt;a href="https://git-scm.com/"&gt;Git&lt;/a&gt; is a distributed &lt;strong&gt;version control system&lt;/strong&gt; that helps developers manage and track changes in their codebase by organizing them into repositories. Several popular Git repository management platforms exist, including GitHub, GitLab, Bitbucket, and Azure DevOps, each offering features and integrations to support various development workflows.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/secure-repositories" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/secure-repositories.webp" alt="secure-repositories" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why is it essential to protect my repositories?&lt;/h3&gt; 
&lt;p&gt;&lt;a href="https://git-scm.com/"&gt;Git&lt;/a&gt; is a distributed &lt;strong&gt;version control system&lt;/strong&gt; that helps developers manage and track changes in their codebase by organizing them into repositories. Several popular Git repository management platforms exist, including GitHub, GitLab, Bitbucket, and Azure DevOps, each offering features and integrations to support various development workflows.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Fsecure-repositories&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 08 Aug 2024 12:00:00 GMT</pubDate>
      <author>clementde@padok.fr (Clément Deberdt)</author>
      <guid>https://security.theodo.com/en/blog/secure-repositories</guid>
      <dc:date>2024-08-08T12:00:00Z</dc:date>
    </item>
    <item>
      <title>Securing your network: five best practices | Theodo Cloud Security</title>
      <link>https://security.theodo.com/en/blog/securing-network</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/securing-network" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/network-security%20%282%29.webp" alt="secure-internal-network" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why should I restrict access to my internal network?&lt;/h3&gt; 
&lt;p&gt;While external &lt;strong&gt;network security&lt;/strong&gt; measures like firewalls are essential for safeguarding against external threats, internal network security is equally critical for protecting an organization's core infrastructure.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/securing-network" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/network-security%20%282%29.webp" alt="secure-internal-network" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Why should I restrict access to my internal network?&lt;/h3&gt; 
&lt;p&gt;While external &lt;strong&gt;network security&lt;/strong&gt; measures like firewalls are essential for safeguarding against external threats, internal network security is equally critical for protecting an organization's core infrastructure.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Fsecuring-network&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Best practices</category>
      <pubDate>Tue, 16 Jul 2024 12:38:30 GMT</pubDate>
      <author>josephines@padok.fr (Joséphine Saint-Joanis)</author>
      <guid>https://security.theodo.com/en/blog/securing-network</guid>
      <dc:date>2024-07-16T12:38:30Z</dc:date>
    </item>
    <item>
      <title>Securing your network: our five best practices | Padok Security</title>
      <link>https://security.theodo.com/en/blog/secure-network</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/secure-network" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/network-security.webp" alt="network-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;What are the challenges of network security?&lt;/h3&gt; 
&lt;p&gt;Network security aims to prevent unauthorized access to resources, detect and prevent attacks, and provide authorized users with secure access to your cloud infrastructure.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://security.theodo.com/en/blog/secure-network" title="" class="hs-featured-image-link"&gt; &lt;img src="https://security.theodo.com/hubfs/Images/Blog/network-security.webp" alt="network-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;What are the challenges of network security?&lt;/h3&gt; 
&lt;p&gt;Network security aims to prevent unauthorized access to resources, detect and prevent attacks, and provide authorized users with secure access to your cloud infrastructure.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5129574&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fsecurity.theodo.com%2Fen%2Fblog%2Fsecure-network&amp;amp;bu=https%253A%252F%252Fsecurity.theodo.com%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Best practices</category>
      <pubDate>Thu, 20 Jun 2024 12:00:00 GMT</pubDate>
      <author>alexandreh@padok.fr (Alexandre Hervé)</author>
      <guid>https://security.theodo.com/en/blog/secure-network</guid>
      <dc:date>2024-06-20T12:00:00Z</dc:date>
    </item>
  </channel>
</rss>
