by Christopher Liljenstolpe | Aug 3, 2018 | Blog, Security, Zerotrust
Well, the Tiger is going to Black Hat in Las Vegas in a few weeks time, and so I’ve been planning our risk mitigation strategy for when we are there. The last thing I want is for the Tiger to show up on the Wall of Sheep. To that end, I’ve written up an...
by Christopher Liljenstolpe | Jul 23, 2018 | Blog, Cybersecurity, Kubernetes, Security, Zerotrust
For almost as long as we have networked computers, we have used the network location or address as their primary identity. Using network location might have made sense when there was a 1:1 mapping between a computer and the thing it was acting for (user, application,...
by Christopher Liljenstolpe | Jul 16, 2018 | Microsegmentation, Microservices, Network Policy, Security
I was doing some Kubernetes network policy training earlier this week for the Infosec team at a large retailer (hi, guys), and we started talking about the process of policy creation and the tiering capabilities available in Tigera’s solution set. Before I dive in,...
by Christopher Liljenstolpe | Jul 13, 2018 | Bgp, Calico, Calico Enterprise, CNX, Project Calico
Tigera’s solutions are equally applicable in both private and public cloud environments. In fact, we are the underlying network policy platform in the hosted Kubernetes offerings from AWS, Azure, Google, and IBM. In almost all cases in the public cloud environment, we...
by Christopher Liljenstolpe | Jul 13, 2018 | Cloud Security, Compliance, Containers, Cybersecurity, Microservices
This is the fourth (and final) part of a four-part series discussing the microservice revolution, and how it impacts the InfoSec community. This series is a not meant to be a definitive guide, but more of an overview that initiates your Microservice journey. The first...