by John Armstrong | May 27, 2020 | Blog, Calico Enterprise, Compliance, Cybersecurity, Firewall, Kubernetes, Network Policy
New applications and workloads are constantly being added to Kubernetes clusters. Those same apps need to securely communicate with resources outside the cluster behind a firewall or other control point. Firewalls require a consistent IP, but routable IPs are a...
by Bikram Gupta | Apr 7, 2020 | Blog, Calico Enterprise, Compliance, Customer Newsletter, Security
Kubernetes is an API-driven platform. Every action happens through an API call into the kube API server. Consequently, recording and monitoring API activity is very important. While most deployments end up sending these logs to a remote destination for compliance...
by John Armstrong | Mar 24, 2020 | Blog, Calico Enterprise, Compliance, Cybersecurity, Fortinet, Kubernetes
What Problems are We Solving? Container use continues to grow, and Kubernetes is the most widely adopted container orchestration system, managing nearly half of all container deployments.1 Successful integration of container services within the enterprise depends...
by Christopher Liljenstolpe | Jul 13, 2018 | Cloud Security, Compliance, Containers, Cybersecurity, Microservices
This is the fourth (and final) part of a four-part series discussing the microservice revolution, and how it impacts the InfoSec community. This series is a not meant to be a definitive guide, but more of an overview that initiates your Microservice journey. The first...
by Christopher Liljenstolpe | Jul 13, 2018 | Compliance, Kubernetes, Security
Many years ago, more than I care to count or remember, I was a network engineer in a remote location with a fairly substantial logistics warehouse facility. Everything was in a database, but, alas, there wasn’t really much of a process in how things in the database...
by Christopher Liljenstolpe | Jun 4, 2018 | Cloud Security, Compliance, Cybersecurity, Microservices, Security
This is the third part of a four-part series discussing the microservice revolution, and how it impacts the InfoSec community. This is not meant to be a definitive guide, but more of an overview that will start you on your own Microservice journey. The first two parts...