Nov 27th, 2025
Blog
May 8, 2021
How to Use Terraform to Deploy Secure Infrastructure as Code
How to Ensure that the Infrastructure Remains Secure and Applications Are Secured Before Deployment[…]
April 17, 2021
An Introduction to Secure Infrastructure as Code (IaC) Using Terraform
A hot topic these days is Infrastructure as Code, or IaC, and how to use tools like Terraform to deploy […]
August 21, 2020
Protect Kubernetes Containers on AWS Using the Shared Responsibility Model
Editor’s note: This post was updated on August 17, 2022 Deploying an AWS container security solution is a critical […]
July 30, 2020
How to Enforce Egress Container Security Policies in Kubernetes, OpenShift, and Istio
Prevent Data Breaches and Unauthorized External Connections from Container Clusters with Egress Control By Gary Duan While more and more […]
June 4, 2020
How to Protect Secrets in Containers Using DPI and DLP
Every cloud application and service utilizes a key (secret) to identify and authorize communications. Secrets are also used to authorize […]
May 14, 2020
How to Protect Web Applications in Containers Using DPI and DLP
Protect Kubernetes Applications with Your Existing Threat Rules By Fei Huang The software security industry has grown very quickly in […]
February 25, 2020
How to Optimize I/O Intensive Containers on Kubernetes
Understanding the Real-time Characteristics of Linux Containers By Jay Huang Highly threaded, I/O intensive Linux containers running on Kubernetes should […]
November 6, 2019
How to Create ‘Security Policy as Code’ to Automate Application Security Policies in the CI/CD Pipeline
DevOps and DevSecOps teams can now automatically deploy and update new applications securely using Kubernetes Custom Resource Definition (CRDs) As […]
August 1, 2019
Container Security Monitoring with Prometheus and Grafana
Today, millions of applications are running in containers, with many millions more going into production. It is not easy to […]