- 04 maggio 2022We looked into Azure App Services and created a threat model to mitigate the impact of threats on the infrastructure and applications.
- 26 novembre 2020Many work-from-home employees use devices for personal and business purposes in home networks that are not as secure as that of the office. This article discusses the threats to unsecure IoT apps and provides ways to secure them.
- 14 ottobre 2020Can your container image be trusted? Learn how Docker Content Trust (DCT) employs digital signatures for container image verification and manages trusted collections of content.
- 14 ottobre 2020With Kubernetes’ popularity and high adoption rates, its security should always be prioritized. We provide vital tips and recommendations on keeping the master node, the API server, etcd, RBAC, and network policies secure.
- 08 ottobre 2020We outline security mitigations and settings that should be prioritized in a clustered environment. The second part of our security guide on Kubernetes clusters covers best practices related to worker nodes, the kubelet, pods, and audit logs.
- 11 agosto 2020Serverless computing is not immune to risks and threats. Our security research provides a comprehensive analysis of the possible attack scenarios that could compromise serverless services and deployments.