Technology Keep in touch
Best practices for IAM in cloud environements
IAM is a complex subject in the cloud, this article addresses security best practices for access management.
Access management: security best practices part 1
IAM is a complex subject in the cloud. Learn to enhance cloud security with IAM best practices: manage access, mitigate risks, ensure compliance...
Deployment of Vault as a Credential Broker for Boundary
This article gives you feedback on implementing and using Vault as a Credential Broker for Boundary.
Run jobs on GitHub organization webhooks with Argo Workflows
Find out how Argo Workflows can help you easily execute tasks following GitHub events triggered across all your repositories.
How to master network policies in a Kubernetes cluster?
Learn how to easily restrict network traffic between your pods in a kubernetes cluster using Network Policies.
Isolate your sensitive workloads with taints, tolerations and affinities
This article explains how to use taints, tolerations, and node affinities to isolate workloads in a Kubernetes cluster.
Secure your App Service with OAuth 2.0 and Terraform on Azure
Learn how to secure a web application running on Azure App Service with Google authentication based on OAuth 2.0 without effort thanks to Terraform.
Discover Paralus, a controlled and audited access to Kubernetes
Paralus empowers companies by providing a centralized Kubernetes user authentication and authorization tool as well as audit logs.
Deploy Falco with Falcosidekick on ECS
Secure your AWS ECS cluster with Falco. This article explains how to implement Falco with falcosidekick on your ECS cluster with EC2 launch type.