5 Unexpected Insights You Can Learn from an Access Management Audit

Modern systems and applications, particularly within the cloud, rely heavily on access and privileges to ensure that the correct users and systems have the access they require. However, users change roles over time, while organizations add and remove systems and components. As a result, these access controls can easily become stale or unsuitable. Auditing the […]

Containerizing Any Application on Any Platform

Portability and reusability are cornerstones of modern software development. Docker Desktop’s robust tools enable developers to containerize any application for deployment on any cloud platform. These portable and reusable applications are ready to deploy wherever a project needs them. Because Docker is platform and language-agnostic, it complements complex architectures that leverage multi-cloud and hybrid cloud […]

Integrating Conjur with Kubernetes Secrets

This article demonstrates how to set up Conjur to automatically populate Kubernetes Secrets with secrets stored in Conjur using the CyberArk Secrets Provider for Kubernetes. There are two ways to set up the Secrets Provider for Kubernetes. We can use: An Init container, in which case the Secrets Provider for Kubernetes is deployed in the […]

Installing Conjur in an EKS Kubernetes Cluster with Helm

Conjur Open Source is a robust secrets management tool to manage, audit, and control access across multiple platforms. Let’s explore how to set up Conjur Open Source in the popular cloud provider, Amazon Web Services (AWS). We’ll start by creating a new AWS Identity and Access Management (IAM) role and attaching the required permissions for […]

Working with Engineering to Reduce Cloud Costs

Cloud platforms provide organizations the opportunity for dynamic decision-making and rapid innovation with no capital investment. Plus, there are many other benefits. Organizations need to adopt the cloud and rethink their operational expenditure with the pay-as-you-go model to gain a competitive edge in an increasingly aggressive digital economy. The pay-as-you-go model enables development teams to […]

Achieving Effective Data Migration

Data migration moves existing data from one computing system to another, usually from an on-premise data center to the cloud. Organizations migrate data to the cloud to increase efficiencies and unlock more significant business benefits. However, we need to carefully plan a migration strategy that meets our business goals to succeed. Before giving the go-ahead […]

Why You Should Learn Linux in 2022

While a typical user may be oblivious to their device’s operating system (OS), that is rarely the case for developers. Most of us prefer to develop on a specific OS. Some of us must also develop for a particular OS. Others still — albeit a declining number — must work on the OS our employers […]

What is a Data Pipeline?

In today’s digital world, big data is a significant driver of business success. Businesses use this information to gain insights and make data-driven decisions. Companies must collect, store and process data from many sources. Considering big data’s volume, variety, and complexity, completing these processes can be challenging. Fortunately, we can configure a data pipeline to […]

What is AWS Network Firewall and Why Should You Use It?

With cyberattacks increasing daily, it’s crucial to protect your application with a firewall. Network firewalls protect your application from threats like malware, botnets, and DDoS attacks while providing advanced access control. There are two ways to add an advanced firewall to your network: with a security appliance and with a software-based firewall. The traditional enterprise […]

Where To Begin With Infrastructure Automation

Infrastructure automation relies on technology to automate tasks involved in controlling hardware, provisioning resources, and handling the essential tasks of configuring and deploying servers and environments. Whether your business workloads are running on-premises or are cloud-based, there are always infrastructure components that must be deployed, managed, and cleaned up — consider virtual machines, virtual network […]