spot_imgspot_imgspot_imgspot_img

Operations

Tech conferences are back – what’s in it for you?

After more than two years, the tech conferences in Europe and elsewhere are back. Some of them still have some kind of Corona-related restrictions based on the rules and regulations in the country in which they take place. Others don't put so many restrictions in place and welcome everyone....

Useful tips and tools to debug your Kubernetes workloads

Kubernetes is the most popular container orchestrator to run cloud-native applications. It acts as a bridge between traditional Virtual Machines and serverless technology. Developers learn to build, package, and actually operate their applications. Security experts help to secure them. These disciplines form the heart of a DevSecOps team. Despite...

Trends and tips about auto-remediation of security issues

Developers should primarily focus on business features that support the core business of the organizations they work for. In DevOps, security can't be forgotten, especially when operating in a public cloud environment. Business representatives and security gurus often clash in terms of priorities and precious resources to find the...

What agentless cloud security is and how Orca Security is pioneering it

Cybersecurity is a growing concern for businesses across industries. Understanding the need to protect information on the internet, several regulations have come into existence. The most prominent ones, such as General Data Protection Regulation (GDPR), ISO/IEC 27001:2013, and Federal Risk and Authorization Management Program (FedRAMP), focus on data protection...

Bulletproofing your systems from a future Log4jShell-like attack

Log4Shell, an online susceptibility that impacts millions of systems through the almost universally used open source software Log4j. Log4j helps to record all activities under the hood of a computer device using log data and is used by the biggest names in the technology sector. The Director of US...

Containers are the new Virtual Machines

There are still people in organizations that need to understand what a container is. And what the main benefits of container technology are. Although the concept is pretty old and the most famous container software (Docker) saw the light nearly a decade ago, this still holds true. Sometimes technical...

4 Key factors that define your security posture in the Cloud

Security posture is defined as the collection of an enterprise’s networks and its capability to combat intruder challenges. In the case of the cloud, the importance of security posture increases manifold as various entities access the cloud server simultaneously; however, four key factors define the security posture in the...

Marking sensitive data – here’s how

Companies that process information should classify their data assets to distinguish mission-critical data and publicly available data. Sensitive data requires better protection in terms of access control, storage, transfer, destruction, etc. This is true for organizations that primarily run in the cloud but also for the ones that operate...

4 ways to cut your cloud bills in half

The cloud began as a lucrative project and although it has been quite economical, maintaining a cloud account can get rather expensive. Servers are expensive and so are the chunky internet connections required for the servers to flourish. Additionally, there are numerous challenges when it comes to maintaining a...

Open source software in the cloud – from a closed door to an open world

Open-source software continues to be on the rise. Not only do consumers use very powerful applications in their daily lives, but companies as well. More and more organizations adopt open source solutions (in the cloud) to fulfill their business needs. The same is true for third-party dependencies and/or libraries...