Content added to Folio

DevOps Resource Center

Technical how-tos and best practices to help you integrate security into your DevOps pipeline

Add Filters
Filter by:
Best Practices for Keeping Amazon S3 Buckets Secure
AWS

Best Practices for Keeping Amazon S3 Buckets Secure

Explore best practices for the five key areas of cloud storage security and gain insight into locking down your data to prevent breaches, identifying and reacting quickly to any breaches that do occur, and preventing similar breaches in the future.

March 09, 2022
Cloud Native

Azure vs. AWS Developer Tools

Both AWS and Azure developer tools provide key efficiencies in your DevOps environment, learn the comparison between tools, any overlap, and use cases for both.

Expert Perspective Jun 22, 2022

Save to Folio

Expert Perspective Jun 22, 2022

Save to Folio

Network Security

Security 101: Cloud-native Virtual Patching

Learn about the challenges faced when implementing a vulnerability and patch management policy and how does cloud-native virtual patching can help.

Expert Perspective Jun 16, 2022

Save to Folio

Expert Perspective Jun 16, 2022

Save to Folio

Container Security

Amazon EKS vs Azure Kubernetes Service

Managed Kubernetes services help organizations deploy, configure, and manage Kubernetes clusters. This article compares two of the biggest service providers: Amazon EKS and Azure Kubernetes Services.

Expert Perspective Jun 09, 2022

Save to Folio

Expert Perspective Jun 09, 2022

Save to Folio

Serverless Security

Tutorial: How to Build Your First Node.js gRPC API

Compared to other API technologies like REST and GraphQL, gRPC is lightweight and exceptionally robust, thanks in large part to its use of protobufs. Interested in exploring how to build your own API? Read on to see how easy it is to do so with Node.js and gRPC.

Expert Perspective Jun 04, 2022

Save to Folio

Expert Perspective Jun 04, 2022

Save to Folio

Compliance

How to implement AWS Sustainability Pillar principles

Learn more about the AWS Well-Architected Framework Sustainability Pillar and how to securely and efficiently implement the six design principles to help you reduce your environmental impact while balancing agility and operational excellence.

How To May 27, 2022

Save to Folio

How To May 27, 2022

Save to Folio

Workload Security

Detect Azure AD Hybrid Cloud Vulnerabilities

AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and Microsoft 365 - learn how to protect against their common vulnerabilities.

How To May 19, 2022

Save to Folio

How To May 19, 2022

Save to Folio

Cloud Native

Adding Guardrails To A Cloud Account After The Fact

This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required?

How To May 11, 2022

Save to Folio

How To May 11, 2022

Save to Folio

Network Security

Workshop: Simplifying Network Security in the Cloud

In this workshop, you will learn how to leverage Trend Micro Cloud One™ - Network Security to provide a powerful network security layer which can be deployed seamlessly into your existing AWS architecture.

Best Practices May 04, 2022

Save to Folio

Best Practices May 04, 2022

Save to Folio

Cloud Native

New AWS Competency Category - Why It's Important

AWS DevOps competency recently added a new category, DevSecOps to its arsenal. Explore our overview of the category and why it matters to security and development teams building in the cloud.

Expert Perspective Apr 27, 2022

Save to Folio

Expert Perspective Apr 27, 2022

Save to Folio