alcide

Alcide Blog

Cloud-native Security Provider

Micro-segmentation for Better Cloud Security

Oct 10, 2018 5:20:56 AM / by Tal Rom posted in cloud security, Micro segmentation, workload protection

0 Comments

Micro-segmentation is an emerging practice that is quickly becoming a critical facet of cloud security. Its objective is not only to prevent compromise, but also to deal with what happens after compromise occurs. The purpose of micro-segmentation is to isolate applications and services from one another in order to prevent attackers from achieving their goalseven if they succeed in initially breaching the organization’s IT defenses.

Read More

4 Steps to a Secured Serverless Deployment: Gartner’s Security Considerations and Best Practices for Securing Serverless PaaS Report

Sep 24, 2018 10:00:00 AM / by Karine Regev posted in Gartner

0 Comments

“For most organizations, we believe serverless PaaS adoption is a matter of when, not if — with enterprise adoption rates exceeding 90% by 2021... However, as with the adoption of VMs and containers, support for securing serverless will initially have visibility and control gaps...Further, new types of attacks will emerge against serverless PaaS, requiring new approaches and techniques.” 1

Read More

Embedding Developers Know-how as Security Policy

Sep 5, 2018 7:43:11 AM / by Tal Rom posted in devsecops, cloud security, kubernetes

2 Comments

Deploying workloads in cloud environments comes with many benefits for businesses in terms of time to market, scalability, cost reduction and ease of use.

Read More

Exposing Kubernetes Workloads to the World Without Losing Sleep (or your Mind)!

Aug 22, 2018 4:12:32 AM / by Elad Ishay posted in kubernetes

1 Comment

So, you’ve got your Kubernetes cluster up and running, and now its time to expose workloads to the outside world in a secure fashion. 

 

Read More

Knative Trifecta

Aug 8, 2018 1:03:00 PM / by Karine Regev posted in serverless, devsecops, cloud security, kubernetes

0 Comments

Trifecta: a variation of the perfecta in which a bettor wins by selecting the first three finishers of a race in the correct order of finish source

Read More

Cloud Security - Learning the Basics

Aug 7, 2018 7:51:33 AM / by Tal Rom posted in cloud security

0 Comments


This is the third post in a series focused on cloud security fundamentals.

Read More

Cloud Network Management and Security

Jul 26, 2018 4:31:48 AM / by Tal Rom posted in cloud security

0 Comments

The post is part two of a blog series on cloud security basics and fundamentals. In this instalment, cloud network management and security are addressed.

Read More

How to Configure Jenkins BitBucket Branch Source Plugin + One Very Annoying Gotcha..

Jul 24, 2018 4:58:42 AM / by Elad Ishay posted in devsecops, Jenkins, BlueOcean, Apache-Tomcat, Bitbucket, bitnami

0 Comments

In case your Git repo resides in Bitbucket and Jenkins is your favourite butler, you’ve come to the right place.

 

 

There is a great plugin out there that helps connecting Jenkins to your Bitbucket account called Bitbucket Branch Source Plugin.
This plugin comes really handy especially if your project has multiple branches. In Jenkins lingo “Multibranch Project”.

Read More

Cloud Security and the Shared Responsibility Model

Jul 4, 2018 12:47:48 PM / by Ranny Nachmias posted in cloud security

0 Comments

 

The post is part of three-part blog series on cloud security basics and fundamentals. In this installment, cloud security and the shared responsibility model are addressed.

Read More

AWS Security Best Practices (+ Free white-paper to download)

Jun 20, 2018 12:57:14 PM / by Elad Ishay posted in AWS, cloud security, security services

0 Comments

Photo www.bluecoat.com//Flickr

 

Security is critical to any organization. In the tech world, security can be defined as a set of controls and policies that protect and secure applications, data, and the technological infrastructures they operate on.

Read More