Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role passing. We look at ways to avoid and detect IAM security holes.
Firewalls and network address translation often stand in the way of access to remote systems, but the free RPort software works around these obstacles and supports remote maintenance through a tunnel locally, in the cloud, and from your home office.
The free Community Edition of the Nutanix hyperconverged infrastructure, Nutanix on-premises cloud, is offered alongside its commercial product for those looking to take their first steps in the environment.
Some application developers try to handle containerized applications as if they were conventional monoliths, but managing updates and security patches in containers needs a totally different approach.
A public key infrastructure in the cloud for secure digital communication maintains the security of an on-premises solution and reduces complexity.
Support flexible working environments with Remote Desktop Services and Azure AD Application Proxy.
Remain independent of your cloud provider by automatically rolling out virtual machines and applications with Ansible neutral inventory files.
A cloud speed test pits Linux distributions against one another.
Automated deployment of the AWS-managed Kubernetes service EKS helps you run a production Kubernetes cluster in the cloud with ease.
Traefik promises not only to manage mesh implementations for container environments reliably, but to do so in a way that makes them enjoyable to administer.