Articles

Lead Image © Zachery Blanton, 123RF.com

Lead Image © Zachery Blanton, 123RF.com

Secure access to Kubernetes

Kubernetes comes with a sophisticated system for ensuring secure access by users and system components through an API. We look at the options for authentication, authorization, and access control.
Lead Image © Franck Boston, Fotolia.com

Lead Image © Franck Boston, Fotolia.com

Export and analyze Azure AD sign-in and audit logs

The relevant sign-in and audit logs in Azure Active Directory can be exported to external data sources to provide not only long-term archiving, but also the freedom to analyze the stored data.
Lead Image © vesuv, photocase.com

Lead Image © vesuv, photocase.com

Building a low-powered NAS

Build a network-attached storage box with Rockstor to manage your data.
Photo by James Pond on Unsplash

Photo by James Pond on Unsplash

Mesh Service for OSI Layers 2 and 3

In early April 2018, the Cloud Native Computing Foundation accepted a new sandboxing project: Network Service Mesh. In this article, we explain how it resembles a conventional service mesh and what makes it different.
Lead Image © amasterpics123, 123RF.com

Lead Image © amasterpics123, 123RF.com

Identity Governance regulates access control in Azure AD

Azure Active Directory Identity Governance brings security processes to organizations with users who access resources or collaborate with partners in the cloud.
Lead Image © Petr Vaclavek, 123RF.com

Lead Image © Petr Vaclavek, 123RF.com

Secure your data channel with stunnel

Stunnel provides a TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.
Lead Image © Eric Gevaert, 123RF.com

Lead Image © Eric Gevaert, 123RF.com

Serverless run times with custom Bash AWS Lambda layers

A piece of old-meets-new functionality lets you run Bash scripts in an AWS Lambda layer.
Lead Image © reddogs, 123RF.com

Lead Image © reddogs, 123RF.com

Use PowerShell to manage Exchange Online

Exchange Online in Office 365 can be managed just like its local counterpart with similar, sometimes identical, PowerShell cmdlets.
Lead Image © nattapol sritongcom, 123RF.com

Lead Image © nattapol sritongcom, 123RF.com

Cloud-native application bundles for easy container deployment

Cloud-native application bundles are an easy option for distributing applications in a microservice architecture.
Lead Image © Jakub Jirsak, 123RF.com

Lead Image © Jakub Jirsak, 123RF.com

Regular expression security

Regular expressions are invaluable for checking user input, but a vulnerability could make them ripe for exploitation.