To Have or Not to Have: Firewall policies as part of your security strategy

|
Today’s massive hybrid networks are a result of an eclectic mix of new and old technologies. As apps, workloads, and now, users move outside of the perimeter, the heterogeneity and complexity of our IT environments continues to expand ... Read More
Mitigating Kubernetes Vulnerabilities with the Least Privilege Principle

Mitigating Kubernetes Vulnerabilities with the Least Privilege Principle

|
A few days ago, the Kubernetes community announced a new vulnerability: IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements ... Read More
An Introduction to Kubernetes Network Policies for Security People

An Introduction to Kubernetes Network Policies for Security People

|
This blog provides some insights into the workings of Kubernetes network policies, how they compare to traditional firewall policies and some pitfalls and best-practices that will help you secure your Kubernetes applications ... Read More
Kubernetes - the Cloud-Native Operating System

Kubernetes – the Cloud-Native Operating System

|
Kubernetes is on a clear path to become the next data center platform, replacing the previous generation of VM-based architectures. Kubernetes is a container orchestrator that enables the deployment and management of large-scale container-based applications, often referred to as microservices applications ... Read More

Extending firewalls to microservices with Istio

|
Istio is an open platform to connect, manage, and secure microservices that helps cloud teams monitor and control microservice applications ... Read More

Tufin Debuts Tufin Orca at DevOpsCon Berlin

|
Recently, I attended DevOpsCon in Berlin with our Tufin Orca team. I've been working with the German market for many years, and I've gotten to know the culture to some extent. I find it unique in that it is often innovative, yet also risk-averse. They don't jump on the bandwagon ... Read More
Security for a DevOps World

Security for a DevOps World

|
Traditional security controls and processes are no fit for the DevOps world because they impede agility. Trying to hack them into a DevOps culture is bound to fail. We combined our expertise in security policy management with expertise from the Dev and DevOps and we think we may have a ... Read More