CLOUD THREAT REPORT 1H 2021 – The COVID-19 Conundrum: Cloud Security Impact and Opportunity
A much prettier version of this document lives here: Foreword In the early days of the COVID-19 pandemic, there was a rapid uptick in demand ..
How to Create Secure Kubernetes Clusters From the Start
If you’ve decided to set up and deploy a Kubernetes cluster, ensuring proper security controls and alignment with overall organization ..
Avoiding the Pitfalls of the Shared Responsibility Model for Cloud Security
The shared responsibility model for cloud security is one of those things that seems simple enough on the surface, but is actually very ..
A Cloud Security Checklist: Assessing Cloud Threats
If you’re like 94% of enterprises, you are using the cloud in one way or another. But if you’re also like 84% of organizations, you are struggling ..
The Top 10 Programming Tasks That Perl Is Used For
In 2020, what are the tasks that Perl continues to be used for? Read on! Programming languages wax and wane, but they never truly disappear. ..
Implementation Strategies for Multicloud Kubernetes
Kubernetes has set new benchmarks and standards for transforming the entire application development and deployment process, across on-prem ..